城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.199.30.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.199.30.206. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:34:22 CST 2025
;; MSG SIZE rcvd: 106
206.30.199.44.in-addr.arpa domain name pointer ec2-44-199-30-206.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
206.30.199.44.in-addr.arpa name = ec2-44-199-30-206.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.153.92.42 | attack | [portscan] Port scan |
2019-08-01 16:50:20 |
| 165.227.96.190 | attackbots | Invalid user jie from 165.227.96.190 port 45736 |
2019-08-01 17:17:04 |
| 73.129.11.75 | attackspambots | Apr 21 08:36:36 ubuntu sshd[656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.129.11.75 Apr 21 08:36:38 ubuntu sshd[656]: Failed password for invalid user don from 73.129.11.75 port 3012 ssh2 Apr 21 08:40:27 ubuntu sshd[1008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.129.11.75 |
2019-08-01 17:15:36 |
| 104.248.7.24 | attackspambots | Aug 1 10:49:56 localhost sshd\[13203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.7.24 user=root Aug 1 10:49:58 localhost sshd\[13203\]: Failed password for root from 104.248.7.24 port 40760 ssh2 Aug 1 10:54:13 localhost sshd\[13773\]: Invalid user watson from 104.248.7.24 port 35928 |
2019-08-01 17:02:22 |
| 180.76.15.13 | attackbotsspam | Automatic report - Banned IP Access |
2019-08-01 17:21:12 |
| 41.213.216.242 | attackspam | 2019-08-01T08:38:45.360642abusebot-7.cloudsearch.cf sshd\[4827\]: Invalid user tecnica from 41.213.216.242 port 60408 |
2019-08-01 16:52:25 |
| 159.65.12.183 | attackbots | Jul 31 04:14:49 cumulus sshd[2895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.12.183 user=bin Jul 31 04:14:51 cumulus sshd[2895]: Failed password for bin from 159.65.12.183 port 34558 ssh2 Jul 31 04:14:52 cumulus sshd[2895]: Received disconnect from 159.65.12.183 port 34558:11: Bye Bye [preauth] Jul 31 04:14:52 cumulus sshd[2895]: Disconnected from 159.65.12.183 port 34558 [preauth] Jul 31 04:28:04 cumulus sshd[3219]: Invalid user vicente from 159.65.12.183 port 54564 Jul 31 04:28:04 cumulus sshd[3219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.12.183 Jul 31 04:28:06 cumulus sshd[3219]: Failed password for invalid user vicente from 159.65.12.183 port 54564 ssh2 Jul 31 04:28:06 cumulus sshd[3219]: Received disconnect from 159.65.12.183 port 54564:11: Bye Bye [preauth] Jul 31 04:28:06 cumulus sshd[3219]: Disconnected from 159.65.12.183 port 54564 [preauth] Jul 31 04:........ ------------------------------- |
2019-08-01 17:24:23 |
| 193.33.111.217 | attack | Aug 1 12:15:19 areeb-Workstation sshd\[24665\]: Invalid user buildbot from 193.33.111.217 Aug 1 12:15:19 areeb-Workstation sshd\[24665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.111.217 Aug 1 12:15:20 areeb-Workstation sshd\[24665\]: Failed password for invalid user buildbot from 193.33.111.217 port 53702 ssh2 ... |
2019-08-01 17:19:08 |
| 68.183.236.66 | attackspam | Jul 30 14:48:35 this_host sshd[3203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.66 user=r.r Jul 30 14:48:37 this_host sshd[3203]: Failed password for r.r from 68.183.236.66 port 49770 ssh2 Jul 30 14:48:38 this_host sshd[3203]: Received disconnect from 68.183.236.66: 11: Bye Bye [preauth] Jul 30 14:59:25 this_host sshd[3272]: Invalid user wt from 68.183.236.66 Jul 30 14:59:25 this_host sshd[3272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.66 Jul 30 14:59:27 this_host sshd[3272]: Failed password for invalid user wt from 68.183.236.66 port 59796 ssh2 Jul 30 14:59:27 this_host sshd[3272]: Received disconnect from 68.183.236.66: 11: Bye Bye [preauth] Jul 30 15:04:41 this_host sshd[3301]: Invalid user kristen from 68.183.236.66 Jul 30 15:04:41 this_host sshd[3301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236........ ------------------------------- |
2019-08-01 16:57:01 |
| 157.230.163.6 | attackspambots | Aug 1 07:47:54 docs sshd\[63727\]: Invalid user geraldo from 157.230.163.6Aug 1 07:47:57 docs sshd\[63727\]: Failed password for invalid user geraldo from 157.230.163.6 port 38856 ssh2Aug 1 07:52:07 docs sshd\[63911\]: Invalid user nologin from 157.230.163.6Aug 1 07:52:10 docs sshd\[63911\]: Failed password for invalid user nologin from 157.230.163.6 port 32926 ssh2Aug 1 07:56:21 docs sshd\[64104\]: Invalid user test from 157.230.163.6Aug 1 07:56:23 docs sshd\[64104\]: Failed password for invalid user test from 157.230.163.6 port 55210 ssh2 ... |
2019-08-01 17:11:47 |
| 5.9.107.211 | attack | Automatic report - Banned IP Access |
2019-08-01 16:54:11 |
| 138.197.166.233 | attack | Aug 1 10:34:29 v22018076622670303 sshd\[26029\]: Invalid user max from 138.197.166.233 port 51900 Aug 1 10:34:29 v22018076622670303 sshd\[26029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.233 Aug 1 10:34:30 v22018076622670303 sshd\[26029\]: Failed password for invalid user max from 138.197.166.233 port 51900 ssh2 ... |
2019-08-01 16:58:59 |
| 88.248.29.116 | attackspam | Trying to (more than 3 packets) bruteforce (not open) telnet port 23 |
2019-08-01 17:05:32 |
| 185.220.101.1 | attack | [ssh] SSH attack |
2019-08-01 17:04:39 |
| 129.211.29.204 | attack | Aug 1 07:17:10 intra sshd\[17388\]: Invalid user -,0m from 129.211.29.204Aug 1 07:17:10 intra sshd\[17388\]: Failed password for invalid user -,0m from 129.211.29.204 port 46456 ssh2Aug 1 07:21:56 intra sshd\[17483\]: Invalid user tz from 129.211.29.204Aug 1 07:21:58 intra sshd\[17483\]: Failed password for invalid user tz from 129.211.29.204 port 39392 ssh2Aug 1 07:26:46 intra sshd\[17551\]: Invalid user 123456 from 129.211.29.204Aug 1 07:26:48 intra sshd\[17551\]: Failed password for invalid user 123456 from 129.211.29.204 port 60650 ssh2 ... |
2019-08-01 17:06:15 |