城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.34.249.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.34.249.29. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:03:04 CST 2022
;; MSG SIZE rcvd: 106
29.249.34.142.in-addr.arpa domain name pointer www.justicebc.ca.
29.249.34.142.in-addr.arpa domain name pointer www.orderofbc.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer www.seniorsadvocatebc.ca.
29.249.34.142.in-addr.arpa domain name pointer adopt.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcartscouncil.ca.
29.249.34.142.in-addr.arpa domain name pointer bcbudget2017.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcforhighschool.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcjobsplan.com.
29.249.34.142.in-addr.arpa domain name pointer bcjobsplan.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcparksvolunteers.ca.
29.249.34.142.in-addr.arpa domain name pointer bcwsinnovation.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer betterbc.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer blog.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer buybc.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer cannabis.gov.bc.ca.
29.24
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.249.34.142.in-addr.arpa name = spills.gov.bc.ca.
29.249.34.142.in-addr.arpa name = thronespeech.gov.bc.ca.
29.249.34.142.in-addr.arpa name = upgradebc.ca.
29.249.34.142.in-addr.arpa name = vanity.blog.gov.bc.ca.
29.249.34.142.in-addr.arpa name = workingforyou.gov.bc.ca.
29.249.34.142.in-addr.arpa name = www.aglg.ca.
29.249.34.142.in-addr.arpa name = www.bcforhighschool.gov.bc.ca.
29.249.34.142.in-addr.arpa name = www.emergencyinfobc.gov.bc.ca.
29.249.34.142.in-addr.arpa name = www.justicebc.ca.
29.249.34.142.in-addr.arpa name = www.orderofbc.gov.bc.ca.
29.249.34.142.in-addr.arpa name = www.seniorsadvocatebc.ca.
29.249.34.142.in-addr.arpa name = adopt.gov.bc.ca.
29.249.34.142.in-addr.arpa name = bcartscouncil.ca.
29.249.34.142.in-addr.arpa name = bcbudget2017.gov.bc.ca.
29.249.34.142.in-addr.arpa name = bcforhighschool.gov.bc.ca.
29.249.34.142.in-addr.arpa name = bcjobsplan.com.
29.249.34.142.in-addr.arpa name = bcjobsplan.gov.bc.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 174.138.20.132 | attack | Aug 21 00:06:20 mout sshd[26123]: Invalid user user from 174.138.20.132 port 43358 |
2019-08-21 06:13:05 |
| 151.73.46.21 | attack | DATE:2019-08-20 16:46:36, IP:151.73.46.21, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-08-21 06:46:50 |
| 114.84.142.178 | attackbots | Aug 20 10:54:53 Tower sshd[8279]: Connection from 114.84.142.178 port 3584 on 192.168.10.220 port 22 Aug 20 10:54:55 Tower sshd[8279]: Invalid user admin from 114.84.142.178 port 3584 Aug 20 10:54:55 Tower sshd[8279]: error: Could not get shadow information for NOUSER Aug 20 10:54:55 Tower sshd[8279]: Failed password for invalid user admin from 114.84.142.178 port 3584 ssh2 Aug 20 10:54:55 Tower sshd[8279]: Received disconnect from 114.84.142.178 port 3584:11: Bye Bye [preauth] Aug 20 10:54:55 Tower sshd[8279]: Disconnected from invalid user admin 114.84.142.178 port 3584 [preauth] |
2019-08-21 06:30:42 |
| 51.75.247.13 | attackbotsspam | 2019-08-20T22:32:23.854013abusebot.cloudsearch.cf sshd\[17619\]: Invalid user pacs from 51.75.247.13 port 37688 |
2019-08-21 06:38:16 |
| 42.51.156.6 | attackspam | Aug 21 00:08:35 dedicated sshd[874]: Invalid user lilian from 42.51.156.6 port 7983 |
2019-08-21 06:28:38 |
| 106.13.87.170 | attack | Aug 20 21:49:50 server01 sshd\[8420\]: Invalid user tanja from 106.13.87.170 Aug 20 21:49:50 server01 sshd\[8420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.170 Aug 20 21:49:52 server01 sshd\[8420\]: Failed password for invalid user tanja from 106.13.87.170 port 45124 ssh2 ... |
2019-08-21 06:39:49 |
| 134.209.174.47 | attack | xmlrpc attack |
2019-08-21 06:30:04 |
| 168.128.13.253 | attack | Aug 20 21:33:11 marvibiene sshd[19277]: Invalid user samba1 from 168.128.13.253 port 48656 Aug 20 21:33:11 marvibiene sshd[19277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.13.253 Aug 20 21:33:11 marvibiene sshd[19277]: Invalid user samba1 from 168.128.13.253 port 48656 Aug 20 21:33:13 marvibiene sshd[19277]: Failed password for invalid user samba1 from 168.128.13.253 port 48656 ssh2 ... |
2019-08-21 06:22:05 |
| 5.249.144.206 | attack | Aug 20 22:39:34 MK-Soft-VM5 sshd\[1124\]: Invalid user deploy from 5.249.144.206 port 40480 Aug 20 22:39:34 MK-Soft-VM5 sshd\[1124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.144.206 Aug 20 22:39:36 MK-Soft-VM5 sshd\[1124\]: Failed password for invalid user deploy from 5.249.144.206 port 40480 ssh2 ... |
2019-08-21 06:50:47 |
| 192.42.116.13 | attackbots | Automated report - ssh fail2ban: Aug 20 16:46:42 wrong password, user=root, port=46096, ssh2 Aug 20 16:46:45 wrong password, user=root, port=46096, ssh2 Aug 20 16:46:49 wrong password, user=root, port=46096, ssh2 Aug 20 16:46:52 wrong password, user=root, port=46096, ssh2 |
2019-08-21 06:37:24 |
| 104.236.239.60 | attack | Aug 20 10:20:14 friendsofhawaii sshd\[22572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60 user=root Aug 20 10:20:17 friendsofhawaii sshd\[22572\]: Failed password for root from 104.236.239.60 port 48501 ssh2 Aug 20 10:24:31 friendsofhawaii sshd\[22956\]: Invalid user samples from 104.236.239.60 Aug 20 10:24:31 friendsofhawaii sshd\[22956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60 Aug 20 10:24:34 friendsofhawaii sshd\[22956\]: Failed password for invalid user samples from 104.236.239.60 port 43413 ssh2 |
2019-08-21 06:23:46 |
| 178.128.158.113 | attack | Invalid user user from 178.128.158.113 port 41418 |
2019-08-21 06:42:29 |
| 5.45.6.66 | attack | Aug 20 18:18:23 rpi sshd[3413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.45.6.66 Aug 20 18:18:25 rpi sshd[3413]: Failed password for invalid user everett from 5.45.6.66 port 56650 ssh2 |
2019-08-21 06:41:02 |
| 49.88.112.90 | attack | Aug 20 22:45:34 localhost sshd\[24519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90 user=root Aug 20 22:45:36 localhost sshd\[24519\]: Failed password for root from 49.88.112.90 port 63568 ssh2 Aug 20 22:45:38 localhost sshd\[24519\]: Failed password for root from 49.88.112.90 port 63568 ssh2 ... |
2019-08-21 06:47:12 |
| 36.152.65.206 | attackspambots | Automatic report - Port Scan Attack |
2019-08-21 06:57:14 |