城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.161.190.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.161.190.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 04:23:35 CST 2024
;; MSG SIZE rcvd: 107
30.190.161.134.in-addr.arpa domain name pointer 190-30.bartlett.uni.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.190.161.134.in-addr.arpa name = 190-30.bartlett.uni.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.140.136.59 | attackbotsspam | Unauthorised access (Sep 2) SRC=122.140.136.59 LEN=40 TTL=49 ID=6507 TCP DPT=8080 WINDOW=44946 SYN Unauthorised access (Sep 2) SRC=122.140.136.59 LEN=40 TTL=49 ID=46886 TCP DPT=8080 WINDOW=18803 SYN |
2019-09-02 15:45:02 |
| 192.99.175.191 | attackbotsspam | 23/tcp 3389/tcp 5901/tcp... [2019-07-04/09-02]22pkt,12pt.(tcp) |
2019-09-02 15:52:05 |
| 107.172.156.150 | attackspambots | Sep 2 10:41:35 yabzik sshd[23348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.156.150 Sep 2 10:41:37 yabzik sshd[23348]: Failed password for invalid user demo from 107.172.156.150 port 45539 ssh2 Sep 2 10:45:31 yabzik sshd[24844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.156.150 |
2019-09-02 15:53:37 |
| 5.63.151.106 | attackspambots | 5353/udp 4000/tcp 10001/tcp... [2019-07-14/09-02]8pkt,5pt.(tcp),3pt.(udp) |
2019-09-02 15:38:13 |
| 121.128.200.146 | attackbotsspam | Sep 2 02:29:09 vtv3 sshd\[12056\]: Invalid user kurt from 121.128.200.146 port 52884 Sep 2 02:29:09 vtv3 sshd\[12056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146 Sep 2 02:29:11 vtv3 sshd\[12056\]: Failed password for invalid user kurt from 121.128.200.146 port 52884 ssh2 Sep 2 02:33:52 vtv3 sshd\[14645\]: Invalid user hitleap from 121.128.200.146 port 41296 Sep 2 02:33:52 vtv3 sshd\[14645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146 Sep 2 02:47:40 vtv3 sshd\[21727\]: Invalid user nas from 121.128.200.146 port 34690 Sep 2 02:47:40 vtv3 sshd\[21727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146 Sep 2 02:47:43 vtv3 sshd\[21727\]: Failed password for invalid user nas from 121.128.200.146 port 34690 ssh2 Sep 2 02:52:20 vtv3 sshd\[24147\]: Invalid user wss from 121.128.200.146 port 51316 Sep 2 02:52:20 vtv3 sshd\[24 |
2019-09-02 15:36:54 |
| 118.24.122.36 | attack | Sep 1 21:35:26 web9 sshd\[4869\]: Invalid user israel from 118.24.122.36 Sep 1 21:35:26 web9 sshd\[4869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.122.36 Sep 1 21:35:28 web9 sshd\[4869\]: Failed password for invalid user israel from 118.24.122.36 port 50446 ssh2 Sep 1 21:40:38 web9 sshd\[5765\]: Invalid user zzz from 118.24.122.36 Sep 1 21:40:38 web9 sshd\[5765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.122.36 |
2019-09-02 15:48:27 |
| 51.254.220.20 | attackbots | Sep 2 08:20:19 cvbmail sshd\[8860\]: Invalid user ts3 from 51.254.220.20 Sep 2 08:20:19 cvbmail sshd\[8860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 Sep 2 08:20:20 cvbmail sshd\[8860\]: Failed password for invalid user ts3 from 51.254.220.20 port 47698 ssh2 |
2019-09-02 15:08:40 |
| 88.202.190.135 | attackbots | 137/udp 8443/tcp 10255/tcp... [2019-07-04/09-02]11pkt,10pt.(tcp),1pt.(udp) |
2019-09-02 15:47:19 |
| 176.31.115.195 | attackspambots | Sep 1 21:31:36 sachi sshd\[22267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns394272.ip-176-31-115.eu user=root Sep 1 21:31:39 sachi sshd\[22267\]: Failed password for root from 176.31.115.195 port 45244 ssh2 Sep 1 21:35:26 sachi sshd\[22597\]: Invalid user guest from 176.31.115.195 Sep 1 21:35:26 sachi sshd\[22597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns394272.ip-176-31-115.eu Sep 1 21:35:28 sachi sshd\[22597\]: Failed password for invalid user guest from 176.31.115.195 port 33024 ssh2 |
2019-09-02 15:39:03 |
| 110.78.80.78 | attack | Automatic report - Port Scan Attack |
2019-09-02 15:14:08 |
| 46.101.76.236 | attackbotsspam | Sep 1 20:26:46 lcdev sshd\[15123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236 user=root Sep 1 20:26:48 lcdev sshd\[15123\]: Failed password for root from 46.101.76.236 port 47440 ssh2 Sep 1 20:34:08 lcdev sshd\[15740\]: Invalid user jv from 46.101.76.236 Sep 1 20:34:08 lcdev sshd\[15740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236 Sep 1 20:34:10 lcdev sshd\[15740\]: Failed password for invalid user jv from 46.101.76.236 port 35846 ssh2 |
2019-09-02 14:48:03 |
| 51.75.32.141 | attackbotsspam | Sep 2 08:49:58 OPSO sshd\[26136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.141 user=root Sep 2 08:49:59 OPSO sshd\[26136\]: Failed password for root from 51.75.32.141 port 39774 ssh2 Sep 2 08:54:09 OPSO sshd\[26884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.141 user=root Sep 2 08:54:12 OPSO sshd\[26884\]: Failed password for root from 51.75.32.141 port 56168 ssh2 Sep 2 08:58:21 OPSO sshd\[27659\]: Invalid user kav from 51.75.32.141 port 45616 Sep 2 08:58:21 OPSO sshd\[27659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.141 |
2019-09-02 15:00:07 |
| 202.133.48.12 | attackspambots | Sep 2 07:02:47 www sshd\[50598\]: Invalid user hara from 202.133.48.12Sep 2 07:02:49 www sshd\[50598\]: Failed password for invalid user hara from 202.133.48.12 port 48776 ssh2Sep 2 07:07:33 www sshd\[50822\]: Invalid user bugzilla from 202.133.48.12 ... |
2019-09-02 15:47:50 |
| 121.201.34.97 | attack | Sep 2 09:42:53 plex sshd[19563]: Invalid user test02 from 121.201.34.97 port 50580 |
2019-09-02 15:46:44 |
| 104.236.38.105 | attackspam | Sep 2 08:34:11 meumeu sshd[14425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105 Sep 2 08:34:13 meumeu sshd[14425]: Failed password for invalid user steam from 104.236.38.105 port 40386 ssh2 Sep 2 08:38:04 meumeu sshd[14976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105 ... |
2019-09-02 14:46:25 |