城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.107.199.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.107.199.51. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 01:38:53 CST 2025
;; MSG SIZE rcvd: 106
51.199.107.34.in-addr.arpa domain name pointer 51.199.107.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
51.199.107.34.in-addr.arpa name = 51.199.107.34.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.152.192.98 | attackbots | Apr 1 06:52:19 nextcloud sshd\[3984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.192.98 user=root Apr 1 06:52:20 nextcloud sshd\[3984\]: Failed password for root from 122.152.192.98 port 35306 ssh2 Apr 1 06:56:07 nextcloud sshd\[7897\]: Invalid user renjing from 122.152.192.98 |
2020-04-01 15:32:14 |
| 213.182.84.153 | attack | Lines containing failures of 213.182.84.153 Apr 1 00:45:50 linuxrulz sshd[13047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.84.153 user=r.r Apr 1 00:45:52 linuxrulz sshd[13047]: Failed password for r.r from 213.182.84.153 port 51072 ssh2 Apr 1 00:45:53 linuxrulz sshd[13047]: Received disconnect from 213.182.84.153 port 51072:11: Bye Bye [preauth] Apr 1 00:45:53 linuxrulz sshd[13047]: Disconnected from authenticating user r.r 213.182.84.153 port 51072 [preauth] Apr 1 00:58:53 linuxrulz sshd[14416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.84.153 user=r.r Apr 1 00:58:55 linuxrulz sshd[14416]: Failed password for r.r from 213.182.84.153 port 41284 ssh2 Apr 1 00:58:56 linuxrulz sshd[14416]: Received disconnect from 213.182.84.153 port 41284:11: Bye Bye [preauth] Apr 1 00:58:56 linuxrulz sshd[14416]: Disconnected from authenticating user r.r 213.182.84.153 po........ ------------------------------ |
2020-04-01 15:41:46 |
| 51.161.8.70 | attackbotsspam | Apr 1 08:25:37 server sshd[39829]: Failed password for root from 51.161.8.70 port 51244 ssh2 Apr 1 08:29:42 server sshd[40888]: Failed password for invalid user dping from 51.161.8.70 port 34766 ssh2 Apr 1 08:33:46 server sshd[41926]: Failed password for root from 51.161.8.70 port 46508 ssh2 |
2020-04-01 15:23:17 |
| 111.231.81.72 | attackbots | Apr 1 07:08:50 Ubuntu-1404-trusty-64-minimal sshd\[14644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.81.72 user=root Apr 1 07:08:52 Ubuntu-1404-trusty-64-minimal sshd\[14644\]: Failed password for root from 111.231.81.72 port 35034 ssh2 Apr 1 07:25:46 Ubuntu-1404-trusty-64-minimal sshd\[22663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.81.72 user=root Apr 1 07:25:48 Ubuntu-1404-trusty-64-minimal sshd\[22663\]: Failed password for root from 111.231.81.72 port 34290 ssh2 Apr 1 07:31:22 Ubuntu-1404-trusty-64-minimal sshd\[30335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.81.72 user=root |
2020-04-01 15:22:49 |
| 182.61.184.155 | attackbotsspam | Invalid user uploader from 182.61.184.155 port 59522 |
2020-04-01 15:16:32 |
| 50.196.140.189 | attackspambots | Apr 1 09:05:17 debian-2gb-nbg1-2 kernel: \[7983766.859112\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=50.196.140.189 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=45 ID=13804 PROTO=TCP SPT=30448 DPT=5555 WINDOW=32760 RES=0x00 SYN URGP=0 |
2020-04-01 15:21:32 |
| 51.158.96.229 | attack | Apr 1 03:21:13 server sshd\[21477\]: Failed password for root from 51.158.96.229 port 33192 ssh2 Apr 1 09:47:06 server sshd\[19283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.96.229 user=root Apr 1 09:47:08 server sshd\[19283\]: Failed password for root from 51.158.96.229 port 53608 ssh2 Apr 1 09:51:17 server sshd\[20324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.96.229 user=root Apr 1 09:51:19 server sshd\[20324\]: Failed password for root from 51.158.96.229 port 42434 ssh2 ... |
2020-04-01 15:11:05 |
| 69.94.131.61 | attack | Apr 1 05:51:34 |
2020-04-01 15:36:30 |
| 51.68.190.223 | attackspambots | Apr 1 05:45:56 ns382633 sshd\[11674\]: Invalid user ccvl from 51.68.190.223 port 35570 Apr 1 05:45:56 ns382633 sshd\[11674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223 Apr 1 05:45:58 ns382633 sshd\[11674\]: Failed password for invalid user ccvl from 51.68.190.223 port 35570 ssh2 Apr 1 05:51:35 ns382633 sshd\[12628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223 user=root Apr 1 05:51:38 ns382633 sshd\[12628\]: Failed password for root from 51.68.190.223 port 57310 ssh2 |
2020-04-01 15:56:25 |
| 173.249.15.13 | attackspambots | Apr 1 08:18:57 MainVPS sshd[32598]: Invalid user chenlin from 173.249.15.13 port 38066 Apr 1 08:18:57 MainVPS sshd[32598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.15.13 Apr 1 08:18:57 MainVPS sshd[32598]: Invalid user chenlin from 173.249.15.13 port 38066 Apr 1 08:18:59 MainVPS sshd[32598]: Failed password for invalid user chenlin from 173.249.15.13 port 38066 ssh2 Apr 1 08:24:14 MainVPS sshd[10732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.15.13 user=root Apr 1 08:24:16 MainVPS sshd[10732]: Failed password for root from 173.249.15.13 port 53598 ssh2 ... |
2020-04-01 15:18:03 |
| 192.241.239.9 | attackspambots | 22/tcp 28017/tcp 8098/tcp... [2020-03-14/04-01]16pkt,14pt.(tcp),2pt.(udp) |
2020-04-01 15:47:35 |
| 123.206.45.16 | attack | Invalid user gek from 123.206.45.16 port 51524 |
2020-04-01 15:35:04 |
| 60.167.117.45 | attackbots | 2020-03-31 22:51:32 H=(K2V0uNwE6) [60.167.117.45]:50540 I=[192.147.25.65]:25 F= |
2020-04-01 15:50:46 |
| 91.134.153.204 | attackbotsspam | Apr 1 09:44:32 vps647732 sshd[5034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.204 Apr 1 09:44:34 vps647732 sshd[5034]: Failed password for invalid user musicbot from 91.134.153.204 port 33680 ssh2 ... |
2020-04-01 15:51:12 |
| 177.69.39.19 | attack | SSH bruteforce (Triggered fail2ban) |
2020-04-01 15:46:20 |