城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.34.249.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.34.249.27. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:03:04 CST 2022
;; MSG SIZE rcvd: 106
27.249.34.142.in-addr.arpa domain name pointer bcjobsplan.com.
27.249.34.142.in-addr.arpa domain name pointer bcjobsplan.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer bcparksvolunteers.ca.
27.249.34.142.in-addr.arpa domain name pointer betterbc.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer blog.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer buybc.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer cannabis.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer cleanbc.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer climate.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer educationinbc.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer energystepcode.ca.
27.249.34.142.in-addr.arpa domain name pointer engage.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer forms.gov.bc.ca.
27.249.34.142.in-addr.arpa domain name pointer fosteringconnections.ca.
27.249.34.142.in-addr.arpa domain name pointer fosternow.gov.bc.ca.
27.249.34.142.in-addr.a
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
27.249.34.142.in-addr.arpa name = goelectricbc.gov.bc.ca.
27.249.34.142.in-addr.arpa name = greatbearrainforest.gov.bc.ca.
27.249.34.142.in-addr.arpa name = housingaction.gov.bc.ca.
27.249.34.142.in-addr.arpa name = iiobc.ca.
27.249.34.142.in-addr.arpa name = lnginbc.gov.bc.ca.
27.249.34.142.in-addr.arpa name = masseytunnel.ca.
27.249.34.142.in-addr.arpa name = ocioconnect.gov.bc.ca.
27.249.34.142.in-addr.arpa name = professionalgovernancebc.ca.
27.249.34.142.in-addr.arpa name = renters.gov.bc.ca.
27.249.34.142.in-addr.arpa name = seniorsadvocatebc.ca.
27.249.34.142.in-addr.arpa name = socialmediatoolkit.gov.bc.ca.
27.249.34.142.in-addr.arpa name = spills.gov.bc.ca.
27.249.34.142.in-addr.arpa name = thronespeech.gov.bc.ca.
27.249.34.142.in-addr.arpa name = upgradebc.ca.
27.249.34.142.in-addr.arpa name = vanity.blog.gov.bc.ca.
27.249.34.142.in-addr.arpa name = workingforyou.gov.bc.ca.
27.249.34.142.in-addr.arpa name = www.aglg.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 157.245.76.159 | attackbotsspam | May 4 15:53:55 *** sshd[20641]: Invalid user dbmaker from 157.245.76.159 |
2020-05-05 01:07:38 |
| 188.166.185.236 | attackbots | 2020-05-04T13:09:31.414059shield sshd\[16563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.236 user=root 2020-05-04T13:09:33.623544shield sshd\[16563\]: Failed password for root from 188.166.185.236 port 36615 ssh2 2020-05-04T13:14:39.974612shield sshd\[17417\]: Invalid user rt from 188.166.185.236 port 41860 2020-05-04T13:14:39.979316shield sshd\[17417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.236 2020-05-04T13:14:41.139742shield sshd\[17417\]: Failed password for invalid user rt from 188.166.185.236 port 41860 ssh2 |
2020-05-05 00:52:00 |
| 176.31.146.32 | attackspam | xmlrpc attack |
2020-05-05 00:55:58 |
| 223.223.190.131 | attack | Unauthorized SSH login attempts |
2020-05-05 00:43:35 |
| 206.189.177.201 | attack | Port scan(s) denied |
2020-05-05 01:14:51 |
| 216.172.161.35 | attackspam | scan |
2020-05-05 01:09:44 |
| 134.209.90.139 | attack | May 4 16:49:59 ip-172-31-62-245 sshd\[8676\]: Invalid user nom from 134.209.90.139\ May 4 16:50:01 ip-172-31-62-245 sshd\[8676\]: Failed password for invalid user nom from 134.209.90.139 port 36914 ssh2\ May 4 16:53:32 ip-172-31-62-245 sshd\[8710\]: Invalid user anil from 134.209.90.139\ May 4 16:53:34 ip-172-31-62-245 sshd\[8710\]: Failed password for invalid user anil from 134.209.90.139 port 46554 ssh2\ May 4 16:57:18 ip-172-31-62-245 sshd\[8744\]: Failed password for root from 134.209.90.139 port 56162 ssh2\ |
2020-05-05 01:22:39 |
| 177.152.124.21 | attackspambots | May 4 17:30:25 host5 sshd[4865]: Invalid user snow from 177.152.124.21 port 37440 ... |
2020-05-05 00:40:43 |
| 192.241.172.175 | attackspambots | May 4 18:40:05 haigwepa sshd[7484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.172.175 May 4 18:40:07 haigwepa sshd[7484]: Failed password for invalid user maundy from 192.241.172.175 port 49438 ssh2 ... |
2020-05-05 00:48:48 |
| 114.67.117.35 | attackspam | May 4 14:09:34 meumeu sshd[23702]: Failed password for root from 114.67.117.35 port 36966 ssh2 May 4 14:10:11 meumeu sshd[23795]: Failed password for root from 114.67.117.35 port 39277 ssh2 ... |
2020-05-05 00:57:30 |
| 182.71.246.162 | attackspambots | May 4 18:03:57 h2829583 sshd[29463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.246.162 |
2020-05-05 00:54:00 |
| 186.214.162.90 | attackspambots | Automatic report - Port Scan Attack |
2020-05-05 01:07:09 |
| 222.186.30.35 | attackspam | May 4 07:24:56 kapalua sshd\[27792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35 user=root May 4 07:24:58 kapalua sshd\[27792\]: Failed password for root from 222.186.30.35 port 31800 ssh2 May 4 07:25:00 kapalua sshd\[27792\]: Failed password for root from 222.186.30.35 port 31800 ssh2 May 4 07:25:02 kapalua sshd\[27792\]: Failed password for root from 222.186.30.35 port 31800 ssh2 May 4 07:25:03 kapalua sshd\[27806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35 user=root |
2020-05-05 01:25:34 |
| 162.243.144.29 | attackbotsspam | 1588610265 - 05/04/2020 18:37:45 Host: 162.243.144.29/162.243.144.29 Port: 113 TCP Blocked |
2020-05-05 01:10:02 |
| 124.251.110.148 | attackbotsspam | May 4 18:33:48 meumeu sshd[5832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 May 4 18:33:49 meumeu sshd[5832]: Failed password for invalid user muhamad from 124.251.110.148 port 41554 ssh2 May 4 18:36:50 meumeu sshd[6457]: Failed password for nagios from 124.251.110.148 port 39494 ssh2 ... |
2020-05-05 00:49:04 |