城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.53.67.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.53.67.8. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:10:31 CST 2025
;; MSG SIZE rcvd: 103
8.67.53.66.in-addr.arpa domain name pointer syn-066-053-067-008.inf.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
8.67.53.66.in-addr.arpa name = syn-066-053-067-008.inf.spectrum.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
85.209.0.103 | attackspambots | Jul 24 17:22:53 server2 sshd\[27203\]: User root from 85.209.0.103 not allowed because not listed in AllowUsers Jul 24 17:22:53 server2 sshd\[27204\]: User root from 85.209.0.103 not allowed because not listed in AllowUsers Jul 24 17:22:53 server2 sshd\[27207\]: User root from 85.209.0.103 not allowed because not listed in AllowUsers Jul 24 17:22:53 server2 sshd\[27216\]: User root from 85.209.0.103 not allowed because not listed in AllowUsers Jul 24 17:22:54 server2 sshd\[27205\]: User root from 85.209.0.103 not allowed because not listed in AllowUsers Jul 24 17:22:54 server2 sshd\[27206\]: User root from 85.209.0.103 not allowed because not listed in AllowUsers |
2020-07-24 22:31:35 |
190.210.231.34 | attack | Jul 24 15:47:57 h2427292 sshd\[21156\]: Invalid user adi from 190.210.231.34 Jul 24 15:47:57 h2427292 sshd\[21156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.231.34 Jul 24 15:47:59 h2427292 sshd\[21156\]: Failed password for invalid user adi from 190.210.231.34 port 58974 ssh2 ... |
2020-07-24 22:44:55 |
216.238.183.171 | attackspambots | Triggered by Fail2Ban at Ares web server |
2020-07-24 22:48:37 |
167.71.196.176 | attackbots | Jul 24 15:48:08 host sshd[16458]: Invalid user admin from 167.71.196.176 port 35400 ... |
2020-07-24 22:39:33 |
40.76.4.214 | attack | (sshd) Failed SSH login from 40.76.4.214 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 24 16:27:32 amsweb01 sshd[15114]: Invalid user rosie from 40.76.4.214 port 48754 Jul 24 16:27:34 amsweb01 sshd[15114]: Failed password for invalid user rosie from 40.76.4.214 port 48754 ssh2 Jul 24 16:39:30 amsweb01 sshd[17121]: Invalid user backup from 40.76.4.214 port 40948 Jul 24 16:39:32 amsweb01 sshd[17121]: Failed password for invalid user backup from 40.76.4.214 port 40948 ssh2 Jul 24 16:43:25 amsweb01 sshd[17666]: Invalid user tech from 40.76.4.214 port 48010 |
2020-07-24 23:05:33 |
107.152.192.145 | attackspambots | (From whitlow.retha@gmail.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com |
2020-07-24 23:07:28 |
183.82.121.34 | attack | Jul 24 16:26:22 Ubuntu-1404-trusty-64-minimal sshd\[30421\]: Invalid user chuck from 183.82.121.34 Jul 24 16:26:22 Ubuntu-1404-trusty-64-minimal sshd\[30421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 Jul 24 16:26:24 Ubuntu-1404-trusty-64-minimal sshd\[30421\]: Failed password for invalid user chuck from 183.82.121.34 port 45944 ssh2 Jul 24 16:37:53 Ubuntu-1404-trusty-64-minimal sshd\[7164\]: Invalid user macky from 183.82.121.34 Jul 24 16:37:53 Ubuntu-1404-trusty-64-minimal sshd\[7164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 |
2020-07-24 22:39:10 |
118.129.34.166 | attackspambots | Jul 24 16:10:11 ns381471 sshd[32595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.129.34.166 Jul 24 16:10:12 ns381471 sshd[32595]: Failed password for invalid user argus from 118.129.34.166 port 32934 ssh2 |
2020-07-24 22:25:54 |
31.132.151.46 | attack | Jul 24 16:26:24 ip106 sshd[24313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.132.151.46 Jul 24 16:26:26 ip106 sshd[24313]: Failed password for invalid user amit from 31.132.151.46 port 40575 ssh2 ... |
2020-07-24 22:32:26 |
139.99.92.181 | attackspam | Port probing on unauthorized port 19654 |
2020-07-24 22:58:01 |
167.99.157.37 | attack | Jul 24 16:03:19 haigwepa sshd[19431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.157.37 Jul 24 16:03:21 haigwepa sshd[19431]: Failed password for invalid user robyn from 167.99.157.37 port 39116 ssh2 ... |
2020-07-24 23:01:26 |
211.139.61.219 | attack | " " |
2020-07-24 22:41:16 |
222.186.30.218 | attackbotsspam | Jul 24 17:01:59 v22018053744266470 sshd[15288]: Failed password for root from 222.186.30.218 port 31918 ssh2 Jul 24 17:02:09 v22018053744266470 sshd[15300]: Failed password for root from 222.186.30.218 port 55117 ssh2 ... |
2020-07-24 23:05:57 |
196.27.127.61 | attack | Jul 24 07:42:32 server1 sshd\[21914\]: Invalid user pl from 196.27.127.61 Jul 24 07:42:32 server1 sshd\[21914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61 Jul 24 07:42:34 server1 sshd\[21914\]: Failed password for invalid user pl from 196.27.127.61 port 54604 ssh2 Jul 24 07:47:47 server1 sshd\[23407\]: Invalid user huanghao from 196.27.127.61 Jul 24 07:47:47 server1 sshd\[23407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61 ... |
2020-07-24 23:06:52 |
159.65.149.139 | attackbots | 2020-07-24T20:43:23.090064billing sshd[16956]: Invalid user user from 159.65.149.139 port 43618 2020-07-24T20:43:25.022935billing sshd[16956]: Failed password for invalid user user from 159.65.149.139 port 43618 ssh2 2020-07-24T20:48:09.307943billing sshd[24579]: Invalid user info from 159.65.149.139 port 57568 ... |
2020-07-24 22:40:41 |