城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.214.130.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.214.130.190. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 01:25:14 CST 2025
;; MSG SIZE rcvd: 107
190.130.214.66.in-addr.arpa domain name pointer syn-066-214-130-190.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
190.130.214.66.in-addr.arpa name = syn-066-214-130-190.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 23.30.221.181 | attackspambots | Sep 14 08:22:21 XXXXXX sshd[26135]: Invalid user ofsaa from 23.30.221.181 port 62184 |
2020-09-14 21:10:35 |
| 36.112.136.33 | attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-09-14 21:12:08 |
| 119.40.33.22 | attack | Sep 14 12:03:41 ip106 sshd[15450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.33.22 Sep 14 12:03:44 ip106 sshd[15450]: Failed password for invalid user ariberto from 119.40.33.22 port 45985 ssh2 ... |
2020-09-14 21:19:53 |
| 122.51.70.219 | attackbots | 2020-09-14 02:38:04.745802-0500 localhost sshd[55369]: Failed password for root from 122.51.70.219 port 59140 ssh2 |
2020-09-14 20:46:49 |
| 198.98.49.7 | attackbotsspam | sshd: Failed password for .... from 198.98.49.7 port 54760 ssh2 (4 attempts) |
2020-09-14 20:59:13 |
| 74.120.14.30 | attackbots | firewall-block, port(s): 47808/udp |
2020-09-14 21:05:10 |
| 106.13.167.94 | attackspam | Sep 14 12:35:13 melroy-server sshd[15499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.94 Sep 14 12:35:15 melroy-server sshd[15499]: Failed password for invalid user apache from 106.13.167.94 port 44260 ssh2 ... |
2020-09-14 21:08:25 |
| 218.56.160.82 | attackbots | Sep 14 11:05:14 Ubuntu-1404-trusty-64-minimal sshd\[32227\]: Invalid user test from 218.56.160.82 Sep 14 11:05:14 Ubuntu-1404-trusty-64-minimal sshd\[32227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.160.82 Sep 14 11:05:15 Ubuntu-1404-trusty-64-minimal sshd\[32227\]: Failed password for invalid user test from 218.56.160.82 port 17897 ssh2 Sep 14 11:18:10 Ubuntu-1404-trusty-64-minimal sshd\[14921\]: Invalid user e from 218.56.160.82 Sep 14 11:18:10 Ubuntu-1404-trusty-64-minimal sshd\[14921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.160.82 |
2020-09-14 20:44:58 |
| 195.2.93.68 | attackbots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-09-14 21:02:50 |
| 106.13.36.10 | attackbotsspam | $f2bV_matches |
2020-09-14 20:49:17 |
| 212.145.192.205 | attackspam | Sep 14 12:17:07 scw-focused-cartwright sshd[13757]: Failed password for root from 212.145.192.205 port 55424 ssh2 |
2020-09-14 21:01:42 |
| 18.141.56.216 | attack | Sep 14 02:31:38 propaganda sshd[40579]: Connection from 18.141.56.216 port 58936 on 10.0.0.161 port 22 rdomain "" Sep 14 02:31:39 propaganda sshd[40579]: Connection closed by 18.141.56.216 port 58936 [preauth] |
2020-09-14 20:44:14 |
| 111.231.71.157 | attackspambots | Sep 14 13:06:40 ns382633 sshd\[19435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root Sep 14 13:06:42 ns382633 sshd\[19435\]: Failed password for root from 111.231.71.157 port 59754 ssh2 Sep 14 13:25:04 ns382633 sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root Sep 14 13:25:07 ns382633 sshd\[23015\]: Failed password for root from 111.231.71.157 port 39710 ssh2 Sep 14 13:33:33 ns382633 sshd\[24865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root |
2020-09-14 20:55:23 |
| 187.207.144.205 | attack | k+ssh-bruteforce |
2020-09-14 20:50:10 |
| 104.248.57.44 | attackspam | Invalid user elias from 104.248.57.44 port 44796 |
2020-09-14 21:16:02 |