城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.204.108.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.204.108.42. IN A
;; AUTHORITY SECTION:
. 327 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:41:00 CST 2022
;; MSG SIZE rcvd: 106
42.108.204.34.in-addr.arpa domain name pointer ec2-34-204-108-42.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.108.204.34.in-addr.arpa name = ec2-34-204-108-42.compute-1.amazonaws.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
107.161.91.54 | attack | Nov 14 15:35:11 icecube postfix/smtpd[22517]: NOQUEUE: reject: RCPT from mail.besttechnologynews.xyz[107.161.91.54]: 450 4.1.8 |
2019-11-15 03:01:36 |
78.188.35.5 | attack | Automatic report - Port Scan Attack |
2019-11-15 03:12:24 |
150.223.12.97 | attack | Nov 13 03:30:18 zulu1842 sshd[18424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.12.97 user=r.r Nov 13 03:30:20 zulu1842 sshd[18424]: Failed password for r.r from 150.223.12.97 port 58338 ssh2 Nov 13 03:30:20 zulu1842 sshd[18424]: Received disconnect from 150.223.12.97: 11: Bye Bye [preauth] Nov 13 03:45:22 zulu1842 sshd[19246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.12.97 user=r.r Nov 13 03:45:24 zulu1842 sshd[19246]: Failed password for r.r from 150.223.12.97 port 38481 ssh2 Nov 13 03:45:24 zulu1842 sshd[19246]: Received disconnect from 150.223.12.97: 11: Bye Bye [preauth] Nov 13 03:49:19 zulu1842 sshd[19510]: Connection closed by 150.223.12.97 [preauth] Nov 13 03:53:13 zulu1842 sshd[19734]: Invalid user toshie from 150.223.12.97 Nov 13 03:53:13 zulu1842 sshd[19734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150......... ------------------------------- |
2019-11-15 02:43:09 |
51.158.67.13 | attack | Nov 14 15:34:54 srv-ubuntu-dev3 sshd[4325]: Did not receive identification string from 51.158.67.13 Nov 14 15:35:34 srv-ubuntu-dev3 sshd[4379]: Invalid user ts3 from 51.158.67.13 Nov 14 15:35:35 srv-ubuntu-dev3 sshd[4382]: Invalid user judge from 51.158.67.13 Nov 14 15:35:34 srv-ubuntu-dev3 sshd[4379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.67.13 Nov 14 15:35:34 srv-ubuntu-dev3 sshd[4379]: Invalid user ts3 from 51.158.67.13 Nov 14 15:35:36 srv-ubuntu-dev3 sshd[4379]: Failed password for invalid user ts3 from 51.158.67.13 port 37698 ssh2 Nov 14 15:35:36 srv-ubuntu-dev3 sshd[4389]: Invalid user minerhub from 51.158.67.13 ... |
2019-11-15 02:42:36 |
80.82.65.40 | attack | 11/14/2019-09:35:33.600787 80.82.65.40 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-15 02:46:53 |
54.38.33.178 | attackspambots | 2019-11-14T17:42:18.976553 sshd[28225]: Invalid user kursd from 54.38.33.178 port 40838 2019-11-14T17:42:18.991146 sshd[28225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.33.178 2019-11-14T17:42:18.976553 sshd[28225]: Invalid user kursd from 54.38.33.178 port 40838 2019-11-14T17:42:21.204499 sshd[28225]: Failed password for invalid user kursd from 54.38.33.178 port 40838 ssh2 2019-11-14T17:46:07.168215 sshd[28343]: Invalid user ebi from 54.38.33.178 port 50214 ... |
2019-11-15 02:59:52 |
217.182.68.100 | attackbots | xmlrpc attack |
2019-11-15 02:43:50 |
113.194.131.86 | attackbotsspam | Nov 14 15:27:38 mxgate1 postfix/postscreen[13169]: CONNECT from [113.194.131.86]:59072 to [176.31.12.44]:25 Nov 14 15:27:38 mxgate1 postfix/dnsblog[13248]: addr 113.194.131.86 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 14 15:27:38 mxgate1 postfix/dnsblog[13254]: addr 113.194.131.86 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 14 15:27:38 mxgate1 postfix/dnsblog[13254]: addr 113.194.131.86 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 14 15:27:38 mxgate1 postfix/dnsblog[13254]: addr 113.194.131.86 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 14 15:27:38 mxgate1 postfix/dnsblog[13247]: addr 113.194.131.86 listed by domain bl.spamcop.net as 127.0.0.2 Nov 14 15:27:38 mxgate1 postfix/dnsblog[13245]: addr 113.194.131.86 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 14 15:27:44 mxgate1 postfix/postscreen[13169]: DNSBL rank 5 for [113.194.131.86]:59072 Nov 14 15:27:45 mxgate1 postfix/tlsproxy[13187]: CONNECT from [113.194.131.86]:59072 Nov x@........ ------------------------------- |
2019-11-15 02:56:11 |
31.184.254.187 | attackbotsspam | Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=31.184.254.187 |
2019-11-15 02:37:45 |
222.186.52.78 | attack | Nov 14 13:50:44 ny01 sshd[13904]: Failed password for root from 222.186.52.78 port 10591 ssh2 Nov 14 13:51:19 ny01 sshd[13948]: Failed password for root from 222.186.52.78 port 34938 ssh2 |
2019-11-15 03:14:39 |
81.22.45.49 | attackbots | Nov 14 19:23:42 h2177944 kernel: \[6631328.716201\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.49 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24235 PROTO=TCP SPT=40338 DPT=4639 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 14 19:25:37 h2177944 kernel: \[6631443.508986\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.49 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=46680 PROTO=TCP SPT=40338 DPT=4407 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 14 19:26:39 h2177944 kernel: \[6631504.974121\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.49 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=61212 PROTO=TCP SPT=40338 DPT=5521 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 14 19:28:56 h2177944 kernel: \[6631642.012982\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.49 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=8918 PROTO=TCP SPT=40338 DPT=5406 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 14 19:35:06 h2177944 kernel: \[6632011.946286\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.49 DST=85.214.117.9 LEN=40 TOS |
2019-11-15 02:41:19 |
218.94.140.106 | attackspam | SSH invalid-user multiple login try |
2019-11-15 03:08:42 |
92.253.23.7 | attackspam | Nov 14 10:07:41 dallas01 sshd[860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.253.23.7 Nov 14 10:07:43 dallas01 sshd[860]: Failed password for invalid user plex from 92.253.23.7 port 51996 ssh2 Nov 14 10:12:20 dallas01 sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.253.23.7 |
2019-11-15 02:44:44 |
46.229.168.142 | attackspambots | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2019-11-15 03:07:22 |
191.191.35.159 | attackspambots | detected by Fail2Ban |
2019-11-15 03:10:22 |