城市(city): Singapore
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.21.149.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.21.149.11. IN A
;; AUTHORITY SECTION:
. 560 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024092502 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 26 07:05:40 CST 2024
;; MSG SIZE rcvd: 105
11.149.21.34.in-addr.arpa domain name pointer 11.149.21.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.149.21.34.in-addr.arpa name = 11.149.21.34.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.170.63.27 | attack | Aug 1 01:22:28 s64-1 sshd[19264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.170.63.27 Aug 1 01:22:30 s64-1 sshd[19264]: Failed password for invalid user htpguides from 222.170.63.27 port 5603 ssh2 Aug 1 01:25:43 s64-1 sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.170.63.27 ... |
2019-08-01 07:52:07 |
| 185.220.101.65 | attackspambots | Jul 29 15:47:58 server sshd\[161794\]: Invalid user c-comatic from 185.220.101.65 Jul 29 15:47:58 server sshd\[161794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.65 Jul 29 15:48:00 server sshd\[161794\]: Failed password for invalid user c-comatic from 185.220.101.65 port 46373 ssh2 ... |
2019-08-01 07:42:21 |
| 218.92.0.167 | attackspam | Aug 1 01:04:34 arianus sshd\[23964\]: Unable to negotiate with 218.92.0.167 port 30725: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\] ... |
2019-08-01 07:26:58 |
| 189.7.17.61 | attackbotsspam | Aug 1 00:49:29 www sshd\[22210\]: Invalid user wangyi from 189.7.17.61 port 45604 ... |
2019-08-01 07:46:48 |
| 178.128.108.96 | attack | Aug 1 02:44:01 www4 sshd\[58843\]: Invalid user ips from 178.128.108.96 Aug 1 02:44:01 www4 sshd\[58843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.108.96 Aug 1 02:44:03 www4 sshd\[58843\]: Failed password for invalid user ips from 178.128.108.96 port 40178 ssh2 Aug 1 02:48:49 www4 sshd\[59308\]: Invalid user psql from 178.128.108.96 Aug 1 02:48:49 www4 sshd\[59308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.108.96 ... |
2019-08-01 08:04:30 |
| 23.243.91.180 | attack | scan z |
2019-08-01 07:37:41 |
| 82.223.69.108 | attackspam | Jul 24 14:38:47 server sshd\[214512\]: Invalid user lex from 82.223.69.108 Jul 24 14:38:47 server sshd\[214512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.223.69.108 Jul 24 14:38:50 server sshd\[214512\]: Failed password for invalid user lex from 82.223.69.108 port 58280 ssh2 ... |
2019-08-01 07:35:47 |
| 158.69.192.200 | attack | Aug 1 04:47:10 itv-usvr-02 sshd[19700]: Invalid user amx from 158.69.192.200 port 46868 Aug 1 04:47:10 itv-usvr-02 sshd[19700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.200 Aug 1 04:47:10 itv-usvr-02 sshd[19700]: Invalid user amx from 158.69.192.200 port 46868 Aug 1 04:47:13 itv-usvr-02 sshd[19700]: Failed password for invalid user amx from 158.69.192.200 port 46868 ssh2 Aug 1 04:47:10 itv-usvr-02 sshd[19700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.200 Aug 1 04:47:10 itv-usvr-02 sshd[19700]: Invalid user amx from 158.69.192.200 port 46868 Aug 1 04:47:13 itv-usvr-02 sshd[19700]: Failed password for invalid user amx from 158.69.192.200 port 46868 ssh2 Aug 1 04:47:16 itv-usvr-02 sshd[19700]: Failed password for invalid user amx from 158.69.192.200 port 46868 ssh2 |
2019-08-01 07:52:55 |
| 186.250.114.52 | attack | failed_logins |
2019-08-01 07:36:10 |
| 222.254.31.136 | attackbots | Jul 31 20:57:47 master sshd[17383]: Failed password for invalid user admin from 222.254.31.136 port 45102 ssh2 |
2019-08-01 07:23:34 |
| 114.67.74.139 | attackspambots | Jul 31 18:29:18 aat-srv002 sshd[23114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139 Jul 31 18:29:20 aat-srv002 sshd[23114]: Failed password for invalid user sam from 114.67.74.139 port 45222 ssh2 Jul 31 18:34:03 aat-srv002 sshd[23220]: Failed password for root from 114.67.74.139 port 37672 ssh2 ... |
2019-08-01 07:54:10 |
| 189.7.73.170 | attackbotsspam | May 31 06:36:01 ubuntu sshd[10957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.73.170 May 31 06:36:03 ubuntu sshd[10957]: Failed password for invalid user ts3server from 189.7.73.170 port 56736 ssh2 May 31 06:39:29 ubuntu sshd[11269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.73.170 May 31 06:39:31 ubuntu sshd[11269]: Failed password for invalid user linux from 189.7.73.170 port 53116 ssh2 |
2019-08-01 07:32:12 |
| 162.214.14.3 | attackbots | Aug 1 01:31:59 SilenceServices sshd[5536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.214.14.3 Aug 1 01:32:02 SilenceServices sshd[5536]: Failed password for invalid user aline from 162.214.14.3 port 40094 ssh2 Aug 1 01:36:14 SilenceServices sshd[8605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.214.14.3 |
2019-08-01 07:52:22 |
| 187.120.15.222 | attackbots | Aug 1 01:16:45 minden010 sshd[12339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.120.15.222 Aug 1 01:16:48 minden010 sshd[12339]: Failed password for invalid user odoo from 187.120.15.222 port 36640 ssh2 Aug 1 01:22:15 minden010 sshd[14237]: Failed password for root from 187.120.15.222 port 60876 ssh2 ... |
2019-08-01 08:06:00 |
| 59.28.91.30 | attackspambots | Aug 1 00:57:29 ArkNodeAT sshd\[28482\]: Invalid user testing from 59.28.91.30 Aug 1 00:57:29 ArkNodeAT sshd\[28482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.91.30 Aug 1 00:57:31 ArkNodeAT sshd\[28482\]: Failed password for invalid user testing from 59.28.91.30 port 48108 ssh2 |
2019-08-01 08:08:46 |