城市(city): Columbus
省份(region): Ohio
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.142.106.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.142.106.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 13:26:43 CST 2025
;; MSG SIZE rcvd: 106
193.106.142.3.in-addr.arpa domain name pointer ec2-3-142-106-193.us-east-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
193.106.142.3.in-addr.arpa name = ec2-3-142-106-193.us-east-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.175.169 | attackbots | Scanned 121 times in the last 24 hours on port 22 |
2020-08-09 08:20:26 |
| 45.145.66.120 | attackspambots | 08/08/2020-20:12:17.591967 45.145.66.120 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-08-09 08:18:41 |
| 207.97.174.134 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-08-09 12:09:34 |
| 51.158.105.98 | attackspambots | Aug 9 00:02:17 icinga sshd[31470]: Failed password for root from 51.158.105.98 port 33744 ssh2 Aug 9 00:15:40 icinga sshd[52822]: Failed password for root from 51.158.105.98 port 44294 ssh2 ... |
2020-08-09 08:29:37 |
| 23.101.160.44 | attackspam | [2020-08-08 23:54:03] NOTICE[1248][C-00004fdf] chan_sip.c: Call from '' (23.101.160.44:54918) to extension '11009725994397432' rejected because extension not found in context 'public'. [2020-08-08 23:54:03] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T23:54:03.771-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="11009725994397432",SessionID="0x7f27203bfb78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/23.101.160.44/54918",ACLName="no_extension_match" [2020-08-08 23:56:01] NOTICE[1248][C-00004fe0] chan_sip.c: Call from '' (23.101.160.44:58702) to extension '8911390498256029' rejected because extension not found in context 'public'. [2020-08-08 23:56:01] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T23:56:01.801-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="8911390498256029",SessionID="0x7f2720621db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV ... |
2020-08-09 12:15:42 |
| 218.92.0.246 | attack | Aug 9 02:23:30 db sshd[10022]: User root from 218.92.0.246 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-09 08:26:35 |
| 61.155.2.142 | attack | 2020-08-08 19:17:55.806482-0500 localhost sshd[4688]: Failed password for root from 61.155.2.142 port 58433 ssh2 |
2020-08-09 08:26:12 |
| 178.62.5.39 | attackbots | 178.62.5.39 - - [09/Aug/2020:05:55:43 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.5.39 - - [09/Aug/2020:05:55:43 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.5.39 - - [09/Aug/2020:05:55:43 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.5.39 - - [09/Aug/2020:05:55:48 +0200] "POST /wp-login.php HTTP/1.1" 200 2007 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.5.39 - - [09/Aug/2020:05:55:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.5.39 - - [09/Aug/2020:05:55:53 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-09 12:22:00 |
| 45.195.201.111 | attackspam | Aug 8 15:19:57 dignus sshd[3018]: Failed password for root from 45.195.201.111 port 55864 ssh2 Aug 8 15:22:13 dignus sshd[3441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.201.111 user=root Aug 8 15:22:15 dignus sshd[3441]: Failed password for root from 45.195.201.111 port 42811 ssh2 Aug 8 15:24:28 dignus sshd[3902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.201.111 user=root Aug 8 15:24:31 dignus sshd[3902]: Failed password for root from 45.195.201.111 port 57992 ssh2 ... |
2020-08-09 08:36:39 |
| 218.18.161.186 | attack | 2020-08-09T10:52:52.084707hostname sshd[27836]: Failed password for root from 218.18.161.186 port 33598 ssh2 2020-08-09T10:55:13.269109hostname sshd[28180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.161.186 user=root 2020-08-09T10:55:14.606395hostname sshd[28180]: Failed password for root from 218.18.161.186 port 32873 ssh2 ... |
2020-08-09 12:05:14 |
| 101.200.62.126 | attack | $f2bV_matches |
2020-08-09 12:20:58 |
| 92.222.180.221 | attackbots | 2020-08-08T21:04:03.334518abusebot-4.cloudsearch.cf sshd[22790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-92-222-180.eu user=root 2020-08-08T21:04:05.718248abusebot-4.cloudsearch.cf sshd[22790]: Failed password for root from 92.222.180.221 port 51954 ssh2 2020-08-08T21:07:09.029877abusebot-4.cloudsearch.cf sshd[22931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-92-222-180.eu user=root 2020-08-08T21:07:11.476688abusebot-4.cloudsearch.cf sshd[22931]: Failed password for root from 92.222.180.221 port 42788 ssh2 2020-08-08T21:10:21.488193abusebot-4.cloudsearch.cf sshd[22972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.ip-92-222-180.eu user=root 2020-08-08T21:10:23.960064abusebot-4.cloudsearch.cf sshd[22972]: Failed password for root from 92.222.180.221 port 33624 ssh2 2020-08-08T21:13:15.339099abusebot-4.cloudsearch.cf sshd[23058]: pa ... |
2020-08-09 08:22:54 |
| 218.92.0.171 | attackspam | $f2bV_matches |
2020-08-09 12:06:51 |
| 220.85.104.202 | attackbotsspam | Aug 9 05:56:01 lnxweb61 sshd[8184]: Failed password for root from 220.85.104.202 port 24713 ssh2 Aug 9 05:56:01 lnxweb61 sshd[8184]: Failed password for root from 220.85.104.202 port 24713 ssh2 |
2020-08-09 12:17:24 |
| 167.71.210.7 | attackspambots | 2020-08-08T17:11:25.203882correo.[domain] sshd[18131]: Failed password for root from 167.71.210.7 port 40038 ssh2 2020-08-08T17:12:55.876580correo.[domain] sshd[18536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7 user=root 2020-08-08T17:12:58.195300correo.[domain] sshd[18536]: Failed password for root from 167.71.210.7 port 33430 ssh2 ... |
2020-08-09 08:35:29 |