城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.134.21.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.134.21.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:49:36 CST 2025
;; MSG SIZE rcvd: 106
145.21.134.68.in-addr.arpa domain name pointer pool-68-134-21-145.bltmmd.fios.verizon.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.21.134.68.in-addr.arpa name = pool-68-134-21-145.bltmmd.fios.verizon.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 149.202.18.43 | attackbots | 5060/udp 5060/udp 5060/udp [2019-12-06/15]3pkt |
2019-12-16 07:30:27 |
| 190.202.54.12 | attackbots | Dec 15 13:03:38 php1 sshd\[11128\]: Invalid user kafka from 190.202.54.12 Dec 15 13:03:38 php1 sshd\[11128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.54.12 Dec 15 13:03:40 php1 sshd\[11128\]: Failed password for invalid user kafka from 190.202.54.12 port 29870 ssh2 Dec 15 13:10:46 php1 sshd\[12337\]: Invalid user asterisk from 190.202.54.12 Dec 15 13:10:46 php1 sshd\[12337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.54.12 |
2019-12-16 07:44:28 |
| 180.76.97.86 | attackspambots | Dec 15 23:25:48 vtv3 sshd[16618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.97.86 Dec 15 23:25:50 vtv3 sshd[16618]: Failed password for invalid user catholic from 180.76.97.86 port 50902 ssh2 Dec 15 23:32:00 vtv3 sshd[19473]: Failed password for root from 180.76.97.86 port 51986 ssh2 Dec 15 23:43:35 vtv3 sshd[24698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.97.86 Dec 15 23:43:37 vtv3 sshd[24698]: Failed password for invalid user skoglar from 180.76.97.86 port 54204 ssh2 Dec 15 23:49:33 vtv3 sshd[27702]: Failed password for root from 180.76.97.86 port 55402 ssh2 Dec 16 00:01:04 vtv3 sshd[1316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.97.86 Dec 16 00:01:05 vtv3 sshd[1316]: Failed password for invalid user stoelen from 180.76.97.86 port 57728 ssh2 Dec 16 00:06:55 vtv3 sshd[3973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty= |
2019-12-16 07:43:07 |
| 181.41.216.130 | attackbots | Dec 15 23:50:44 grey postfix/smtpd\[4437\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.130\]: 554 5.7.1 Service unavailable\; Client host \[181.41.216.130\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[181.41.216.130\]\; from=\ |
2019-12-16 07:50:08 |
| 206.189.145.251 | attackspam | Dec 16 00:24:59 h2177944 sshd\[18411\]: Invalid user vangestad from 206.189.145.251 port 47620 Dec 16 00:24:59 h2177944 sshd\[18411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.251 Dec 16 00:25:01 h2177944 sshd\[18411\]: Failed password for invalid user vangestad from 206.189.145.251 port 47620 ssh2 Dec 16 00:31:11 h2177944 sshd\[18778\]: Invalid user zucchelli from 206.189.145.251 port 54916 Dec 16 00:31:11 h2177944 sshd\[18778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.251 ... |
2019-12-16 07:36:36 |
| 153.126.202.140 | attackspambots | Dec 15 13:18:15 wbs sshd\[27372\]: Invalid user heinzen from 153.126.202.140 Dec 15 13:18:15 wbs sshd\[27372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ik1-337-28636.vs.sakura.ne.jp Dec 15 13:18:17 wbs sshd\[27372\]: Failed password for invalid user heinzen from 153.126.202.140 port 36934 ssh2 Dec 15 13:24:09 wbs sshd\[27941\]: Invalid user koll from 153.126.202.140 Dec 15 13:24:09 wbs sshd\[27941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ik1-337-28636.vs.sakura.ne.jp |
2019-12-16 07:39:46 |
| 180.106.81.168 | attackspambots | 2019-12-15T17:46:24.915432homeassistant sshd[20929]: Failed password for invalid user sheryl from 180.106.81.168 port 34066 ssh2 2019-12-15T22:49:05.861682homeassistant sshd[28377]: Invalid user furlin from 180.106.81.168 port 35026 2019-12-15T22:49:05.868580homeassistant sshd[28377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.106.81.168 ... |
2019-12-16 07:58:20 |
| 99.242.114.107 | attack | Brute-force attempt banned |
2019-12-16 07:37:38 |
| 222.186.175.161 | attackbots | Dec 16 00:34:17 h2177944 sshd\[18958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161 user=root Dec 16 00:34:20 h2177944 sshd\[18958\]: Failed password for root from 222.186.175.161 port 1208 ssh2 Dec 16 00:34:23 h2177944 sshd\[18958\]: Failed password for root from 222.186.175.161 port 1208 ssh2 Dec 16 00:34:26 h2177944 sshd\[18958\]: Failed password for root from 222.186.175.161 port 1208 ssh2 ... |
2019-12-16 07:36:08 |
| 159.203.201.217 | attackspambots | Unauthorized connection attempt detected from IP address 159.203.201.217 to port 514 |
2019-12-16 07:22:25 |
| 5.211.244.253 | attackbots | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-12-16 08:06:10 |
| 106.12.120.19 | attack | Dec 16 00:46:09 sd-53420 sshd\[26845\]: Invalid user icaro from 106.12.120.19 Dec 16 00:46:09 sd-53420 sshd\[26845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.19 Dec 16 00:46:10 sd-53420 sshd\[26845\]: Failed password for invalid user icaro from 106.12.120.19 port 39932 ssh2 Dec 16 00:51:02 sd-53420 sshd\[28669\]: User root from 106.12.120.19 not allowed because none of user's groups are listed in AllowGroups Dec 16 00:51:02 sd-53420 sshd\[28669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.19 user=root ... |
2019-12-16 07:56:34 |
| 138.68.93.14 | attackspam | Dec 15 23:40:59 MainVPS sshd[1056]: Invalid user pi from 138.68.93.14 port 34420 Dec 15 23:40:59 MainVPS sshd[1056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 Dec 15 23:40:59 MainVPS sshd[1056]: Invalid user pi from 138.68.93.14 port 34420 Dec 15 23:41:01 MainVPS sshd[1056]: Failed password for invalid user pi from 138.68.93.14 port 34420 ssh2 Dec 15 23:49:26 MainVPS sshd[16998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 user=root Dec 15 23:49:28 MainVPS sshd[16998]: Failed password for root from 138.68.93.14 port 41754 ssh2 ... |
2019-12-16 07:25:55 |
| 40.92.11.69 | attackbots | Dec 16 01:49:24 debian-2gb-vpn-nbg1-1 kernel: [828535.674438] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.11.69 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=19234 DF PROTO=TCP SPT=55648 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-12-16 07:31:55 |
| 163.44.153.232 | attack | Dec 16 00:47:57 vps691689 sshd[31324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.153.232 Dec 16 00:47:59 vps691689 sshd[31324]: Failed password for invalid user leilani from 163.44.153.232 port 42192 ssh2 ... |
2019-12-16 08:03:46 |