城市(city): Ashburn
省份(region): Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.207.166.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.207.166.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102001 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 21 13:33:30 CST 2025
;; MSG SIZE rcvd: 106
20.166.207.34.in-addr.arpa domain name pointer ec2-34-207-166-20.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.166.207.34.in-addr.arpa name = ec2-34-207-166-20.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.76.171.53 | attackbots | Invalid user vicherd from 180.76.171.53 port 51474 |
2019-12-21 07:33:54 |
| 62.234.154.56 | attack | Invalid user jennifer from 62.234.154.56 port 37405 |
2019-12-21 07:11:47 |
| 106.75.178.195 | attack | Dec 21 00:12:26 vps691689 sshd[18707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.178.195 Dec 21 00:12:28 vps691689 sshd[18707]: Failed password for invalid user karam from 106.75.178.195 port 46434 ssh2 ... |
2019-12-21 07:25:07 |
| 163.44.158.95 | attackspam | Dec 21 00:11:16 localhost sshd\[5035\]: Invalid user ladean from 163.44.158.95 Dec 21 00:11:16 localhost sshd\[5035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.158.95 Dec 21 00:11:17 localhost sshd\[5035\]: Failed password for invalid user ladean from 163.44.158.95 port 51798 ssh2 Dec 21 00:16:57 localhost sshd\[5273\]: Invalid user server from 163.44.158.95 Dec 21 00:16:57 localhost sshd\[5273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.158.95 ... |
2019-12-21 07:31:30 |
| 181.169.252.31 | attackbots | $f2bV_matches |
2019-12-21 07:16:41 |
| 185.53.88.10 | attack | Dec 20 23:58:09 debian-2gb-nbg1-2 kernel: \[535449.898689\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.53.88.10 DST=195.201.40.59 LEN=434 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=UDP SPT=5142 DPT=5060 LEN=414 |
2019-12-21 07:27:00 |
| 110.37.227.50 | attackbotsspam | Unauthorized connection attempt detected from IP address 110.37.227.50 to port 445 |
2019-12-21 07:15:45 |
| 106.12.15.230 | attack | Dec 20 22:58:42 zx01vmsma01 sshd[38780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.15.230 Dec 20 22:58:43 zx01vmsma01 sshd[38780]: Failed password for invalid user osmc from 106.12.15.230 port 49316 ssh2 ... |
2019-12-21 07:00:26 |
| 123.142.108.122 | attackspambots | Dec 20 13:25:57 tdfoods sshd\[25999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122 user=root Dec 20 13:25:59 tdfoods sshd\[25999\]: Failed password for root from 123.142.108.122 port 56046 ssh2 Dec 20 13:31:42 tdfoods sshd\[26582\]: Invalid user info from 123.142.108.122 Dec 20 13:31:42 tdfoods sshd\[26582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122 Dec 20 13:31:43 tdfoods sshd\[26582\]: Failed password for invalid user info from 123.142.108.122 port 33778 ssh2 |
2019-12-21 07:32:43 |
| 195.154.169.244 | attackspam | Dec 20 13:08:50 php1 sshd\[11830\]: Invalid user Qaz@2019 from 195.154.169.244 Dec 20 13:08:50 php1 sshd\[11830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-169-244.rev.poneytelecom.eu Dec 20 13:08:52 php1 sshd\[11830\]: Failed password for invalid user Qaz@2019 from 195.154.169.244 port 36460 ssh2 Dec 20 13:14:07 php1 sshd\[12685\]: Invalid user sutterlin from 195.154.169.244 Dec 20 13:14:07 php1 sshd\[12685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-169-244.rev.poneytelecom.eu |
2019-12-21 07:17:03 |
| 222.186.169.194 | attackbots | Dec 21 00:06:22 MK-Soft-Root2 sshd[24130]: Failed password for root from 222.186.169.194 port 20588 ssh2 Dec 21 00:06:27 MK-Soft-Root2 sshd[24130]: Failed password for root from 222.186.169.194 port 20588 ssh2 ... |
2019-12-21 07:10:10 |
| 46.38.144.117 | attackbotsspam | Dec 20 23:52:08 relay postfix/smtpd\[23663\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 23:53:07 relay postfix/smtpd\[12085\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 23:55:19 relay postfix/smtpd\[23663\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 23:56:16 relay postfix/smtpd\[12085\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 23:58:28 relay postfix/smtpd\[23650\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-21 07:12:10 |
| 221.204.118.169 | attack | Fail2Ban - FTP Abuse Attempt |
2019-12-21 07:05:13 |
| 167.99.81.101 | attack | Sep 17 06:51:31 vtv3 sshd[14944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101 Sep 17 06:51:33 vtv3 sshd[14944]: Failed password for invalid user postmaster from 167.99.81.101 port 34900 ssh2 Sep 17 06:55:48 vtv3 sshd[16994]: Invalid user ernestine from 167.99.81.101 port 48004 Sep 17 06:55:48 vtv3 sshd[16994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101 Sep 17 07:08:33 vtv3 sshd[23103]: Invalid user sales from 167.99.81.101 port 59074 Sep 17 07:08:33 vtv3 sshd[23103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101 Sep 17 07:08:35 vtv3 sshd[23103]: Failed password for invalid user sales from 167.99.81.101 port 59074 ssh2 Sep 17 07:12:45 vtv3 sshd[25178]: Invalid user mq from 167.99.81.101 port 43934 Sep 17 07:12:45 vtv3 sshd[25178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.81.101 Sep 17 07 |
2019-12-21 07:21:58 |
| 31.13.191.71 | attackbots | fell into ViewStateTrap:wien2018 |
2019-12-21 07:22:11 |