城市(city): Boardman
省份(region): Oregon
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.209.116.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.209.116.129. IN A
;; AUTHORITY SECTION:
. 519 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400
;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 08:25:59 CST 2019
;; MSG SIZE rcvd: 118
129.116.209.34.in-addr.arpa domain name pointer ec2-34-209-116-129.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.116.209.34.in-addr.arpa name = ec2-34-209-116-129.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 94.102.49.206 | attackbots | Apr 4 00:22:44 OPSO sshd\[28653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.206 user=root Apr 4 00:22:46 OPSO sshd\[28653\]: Failed password for root from 94.102.49.206 port 50832 ssh2 Apr 4 00:22:47 OPSO sshd\[28655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.206 user=root Apr 4 00:22:49 OPSO sshd\[28655\]: Failed password for root from 94.102.49.206 port 55300 ssh2 Apr 4 00:22:49 OPSO sshd\[28658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.102.49.206 user=root |
2020-04-04 07:08:51 |
| 46.38.145.6 | attack | 2020-04-03T16:33:12.039441linuxbox-skyline auth[34179]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=ext rhost=46.38.145.6 ... |
2020-04-04 06:42:12 |
| 125.115.211.154 | attackspambots | Automatic report - Port Scan Attack |
2020-04-04 07:08:08 |
| 104.248.1.92 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-04-04 07:08:34 |
| 92.190.153.246 | attackbotsspam | Apr 4 00:08:44 vps sshd[21266]: Failed password for root from 92.190.153.246 port 52742 ssh2 Apr 4 00:11:42 vps sshd[21504]: Failed password for root from 92.190.153.246 port 37392 ssh2 ... |
2020-04-04 07:00:10 |
| 222.186.180.130 | attack | Apr 4 01:02:18 cvbnet sshd[30853]: Failed password for root from 222.186.180.130 port 64494 ssh2 Apr 4 01:02:22 cvbnet sshd[30853]: Failed password for root from 222.186.180.130 port 64494 ssh2 ... |
2020-04-04 07:09:34 |
| 138.197.113.240 | attack | Invalid user emery from 138.197.113.240 port 48625 |
2020-04-04 06:35:36 |
| 200.2.189.27 | attack | Automatic report - Port Scan Attack |
2020-04-04 06:44:30 |
| 220.248.30.58 | attack | Apr 3 23:33:22 rotator sshd\[20813\]: Invalid user ubuntu from 220.248.30.58Apr 3 23:33:24 rotator sshd\[20813\]: Failed password for invalid user ubuntu from 220.248.30.58 port 21165 ssh2Apr 3 23:37:13 rotator sshd\[21623\]: Invalid user wyq from 220.248.30.58Apr 3 23:37:14 rotator sshd\[21623\]: Failed password for invalid user wyq from 220.248.30.58 port 45976 ssh2Apr 3 23:41:00 rotator sshd\[22436\]: Invalid user zhangyy from 220.248.30.58Apr 3 23:41:02 rotator sshd\[22436\]: Failed password for invalid user zhangyy from 220.248.30.58 port 6275 ssh2 ... |
2020-04-04 06:46:42 |
| 91.212.150.151 | attack | Honeypot hit. |
2020-04-04 06:30:43 |
| 209.97.133.196 | attack | 2020-04-03T16:21:33.212483linuxbox-skyline sshd[34037]: Invalid user ek from 209.97.133.196 port 52568 ... |
2020-04-04 06:32:59 |
| 202.179.76.187 | attackspam | Invalid user amrita from 202.179.76.187 port 58376 |
2020-04-04 06:48:56 |
| 103.84.93.32 | attackspam | Apr 4 00:37:24 nextcloud sshd\[15818\]: Invalid user teamspeak from 103.84.93.32 Apr 4 00:37:24 nextcloud sshd\[15818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.93.32 Apr 4 00:37:26 nextcloud sshd\[15818\]: Failed password for invalid user teamspeak from 103.84.93.32 port 42356 ssh2 |
2020-04-04 07:06:20 |
| 118.116.8.215 | attackspambots | Lines containing failures of 118.116.8.215 Apr 3 23:10:43 shared05 sshd[25707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.116.8.215 user=r.r Apr 3 23:10:44 shared05 sshd[25707]: Failed password for r.r from 118.116.8.215 port 41597 ssh2 Apr 3 23:10:45 shared05 sshd[25707]: Received disconnect from 118.116.8.215 port 41597:11: Bye Bye [preauth] Apr 3 23:10:45 shared05 sshd[25707]: Disconnected from authenticating user r.r 118.116.8.215 port 41597 [preauth] Apr 3 23:29:51 shared05 sshd[781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.116.8.215 user=r.r Apr 3 23:29:52 shared05 sshd[781]: Failed password for r.r from 118.116.8.215 port 44590 ssh2 Apr 3 23:29:52 shared05 sshd[781]: Received disconnect from 118.116.8.215 port 44590:11: Bye Bye [preauth] Apr 3 23:29:52 shared05 sshd[781]: Disconnected from authenticating user r.r 118.116.8.215 port 44590 [preauth] Apr 3........ ------------------------------ |
2020-04-04 06:32:03 |
| 5.135.179.178 | attack | Apr 4 00:32:39 vps647732 sshd[2188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.179.178 Apr 4 00:32:41 vps647732 sshd[2188]: Failed password for invalid user te from 5.135.179.178 port 2093 ssh2 ... |
2020-04-04 07:06:45 |