城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.129.13.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.129.13.209. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:04:11 CST 2025
;; MSG SIZE rcvd: 107
209.13.129.174.in-addr.arpa domain name pointer ec2-174-129-13-209.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
209.13.129.174.in-addr.arpa name = ec2-174-129-13-209.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 116.126.102.68 | attack | Aug 6 23:36:27 sip sshd[27805]: Failed password for root from 116.126.102.68 port 58170 ssh2 Aug 6 23:51:18 sip sshd[31757]: Failed password for root from 116.126.102.68 port 43052 ssh2 |
2020-08-07 06:13:00 |
| 111.230.10.176 | attack | Aug 6 23:55:12 |
2020-08-07 06:20:38 |
| 192.99.70.208 | attackbots | Aug 7 00:26:12 ip106 sshd[6104]: Failed password for root from 192.99.70.208 port 37618 ssh2 ... |
2020-08-07 06:36:10 |
| 154.0.170.4 | attackspam | $f2bV_matches |
2020-08-07 06:25:18 |
| 208.109.12.104 | attack | 2020-08-06T23:51:17.159583amanda2.illicoweb.com sshd\[17420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-208-109-12-104.ip.secureserver.net user=root 2020-08-06T23:51:19.364108amanda2.illicoweb.com sshd\[17420\]: Failed password for root from 208.109.12.104 port 60172 ssh2 2020-08-06T23:53:27.120495amanda2.illicoweb.com sshd\[17857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-208-109-12-104.ip.secureserver.net user=root 2020-08-06T23:53:28.838169amanda2.illicoweb.com sshd\[17857\]: Failed password for root from 208.109.12.104 port 46510 ssh2 2020-08-06T23:55:31.145793amanda2.illicoweb.com sshd\[18143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-208-109-12-104.ip.secureserver.net user=root ... |
2020-08-07 06:07:01 |
| 183.131.249.58 | attack | Aug 6 23:45:19 [host] sshd[10034]: pam_unix(sshd: Aug 6 23:45:21 [host] sshd[10034]: Failed passwor Aug 6 23:55:14 [host] sshd[10294]: pam_unix(sshd: |
2020-08-07 06:16:52 |
| 45.129.33.7 | attackspam | Multiport scan : 35 ports scanned 3388 5907 5908 5911 5912 5913 5915 5920 5922 5923 5925 5929 5931 5932 5934 5935 5946 5948 5952 5953 5957 5961 5962 5966 5974 5975 5979 5985 5986 5988 5989 5992 5994 5997 5999 |
2020-08-07 06:32:29 |
| 49.234.212.177 | attackspambots | Multiple SSH authentication failures from 49.234.212.177 |
2020-08-07 06:25:36 |
| 129.204.235.54 | attackbots | Aug 6 23:47:38 server sshd[28273]: Failed password for root from 129.204.235.54 port 55654 ssh2 Aug 6 23:51:13 server sshd[29482]: Failed password for root from 129.204.235.54 port 55034 ssh2 Aug 6 23:54:46 server sshd[30614]: Failed password for root from 129.204.235.54 port 54414 ssh2 |
2020-08-07 06:40:14 |
| 79.8.196.108 | attackbotsspam | *Port Scan* detected from 79.8.196.108 (IT/Italy/Lombardy/Bergamo/host-79-8-196-108.business.telecomitalia.it). 4 hits in the last 80 seconds |
2020-08-07 06:20:55 |
| 159.89.170.154 | attackspambots | (sshd) Failed SSH login from 159.89.170.154 (IN/India/-): 12 in the last 3600 secs |
2020-08-07 06:30:19 |
| 14.141.61.171 | attack | Aug 6 21:55:22 IngegnereFirenze sshd[29137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.141.61.171 user=root ... |
2020-08-07 06:14:33 |
| 78.42.135.89 | attack | 2020-08-06T23:46:15.039509amanda2.illicoweb.com sshd\[16646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-042-135-089.hsi3.kabel-badenwuerttemberg.de user=root 2020-08-06T23:46:17.118526amanda2.illicoweb.com sshd\[16646\]: Failed password for root from 78.42.135.89 port 53894 ssh2 2020-08-06T23:50:51.338645amanda2.illicoweb.com sshd\[17245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-042-135-089.hsi3.kabel-badenwuerttemberg.de user=root 2020-08-06T23:50:53.974727amanda2.illicoweb.com sshd\[17245\]: Failed password for root from 78.42.135.89 port 37396 ssh2 2020-08-06T23:55:33.476033amanda2.illicoweb.com sshd\[18136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-042-135-089.hsi3.kabel-badenwuerttemberg.de user=root ... |
2020-08-07 06:05:56 |
| 147.75.34.138 | attackspam | *Port Scan* detected from 147.75.34.138 (NL/Netherlands/North Holland/Amsterdam/-). 4 hits in the last 206 seconds |
2020-08-07 06:25:53 |
| 222.114.21.218 | attackspam | Aug 6 23:55:23 debian-2gb-nbg1-2 kernel: \[19009377.319292\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.114.21.218 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=44374 PROTO=TCP SPT=35827 DPT=9530 WINDOW=47600 RES=0x00 SYN URGP=0 |
2020-08-07 06:12:10 |