城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.93.81.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.93.81.104. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 01:28:17 CST 2025
;; MSG SIZE rcvd: 106
Host 104.81.93.100.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.81.93.100.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.85.42.89 | attackspam | Sep 17 04:53:42 server sshd\[2176\]: User root from 112.85.42.89 not allowed because listed in DenyUsers Sep 17 04:53:43 server sshd\[2176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root Sep 17 04:53:45 server sshd\[2176\]: Failed password for invalid user root from 112.85.42.89 port 48797 ssh2 Sep 17 04:53:48 server sshd\[2176\]: Failed password for invalid user root from 112.85.42.89 port 48797 ssh2 Sep 17 04:53:50 server sshd\[2176\]: Failed password for invalid user root from 112.85.42.89 port 48797 ssh2 |
2019-09-17 09:58:20 |
| 159.89.38.26 | attack | Sep 16 14:47:52 wbs sshd\[5141\]: Invalid user nopassword from 159.89.38.26 Sep 16 14:47:52 wbs sshd\[5141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26 Sep 16 14:47:54 wbs sshd\[5141\]: Failed password for invalid user nopassword from 159.89.38.26 port 37000 ssh2 Sep 16 14:52:55 wbs sshd\[5580\]: Invalid user apisms from 159.89.38.26 Sep 16 14:52:55 wbs sshd\[5580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26 |
2019-09-17 09:43:05 |
| 167.71.140.118 | attackspam | Sep 16 15:24:07 aiointranet sshd\[27745\]: Invalid user c from 167.71.140.118 Sep 16 15:24:07 aiointranet sshd\[27745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.140.118 Sep 16 15:24:09 aiointranet sshd\[27745\]: Failed password for invalid user c from 167.71.140.118 port 35576 ssh2 Sep 16 15:27:29 aiointranet sshd\[28017\]: Invalid user zabbix from 167.71.140.118 Sep 16 15:27:29 aiointranet sshd\[28017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.140.118 |
2019-09-17 09:41:38 |
| 159.203.201.54 | attackspambots | firewall-block, port(s): 1527/tcp |
2019-09-17 09:58:02 |
| 134.209.104.122 | attack | 134.209.104.122 - - [16/Sep/2019:20:50:17 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.104.122 - - [16/Sep/2019:20:50:27 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.104.122 - - [16/Sep/2019:20:50:32 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.104.122 - - [16/Sep/2019:20:50:41 +0200] "POST /wp-login.php HTTP/1.1" 200 1631 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.104.122 - - [16/Sep/2019:20:50:45 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.104.122 - - [16/Sep/2019:20:50:52 +0200] "POST /wp-login.php HTTP/1.1" 200 1630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" . |
2019-09-17 09:41:58 |
| 93.243.174.114 | attackspam | 3389BruteforceFW22 |
2019-09-17 09:35:23 |
| 159.203.73.181 | attackbots | Sep 16 17:25:24 aat-srv002 sshd[25347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.73.181 Sep 16 17:25:27 aat-srv002 sshd[25347]: Failed password for invalid user rev. from 159.203.73.181 port 35097 ssh2 Sep 16 17:29:11 aat-srv002 sshd[25440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.73.181 Sep 16 17:29:13 aat-srv002 sshd[25440]: Failed password for invalid user network1 from 159.203.73.181 port 57164 ssh2 ... |
2019-09-17 09:45:49 |
| 104.248.134.17 | attackspambots | Sep 16 09:02:54 lcprod sshd\[26563\]: Invalid user Victor1 from 104.248.134.17 Sep 16 09:02:54 lcprod sshd\[26563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.17 Sep 16 09:02:56 lcprod sshd\[26563\]: Failed password for invalid user Victor1 from 104.248.134.17 port 54218 ssh2 Sep 16 09:06:47 lcprod sshd\[26909\]: Invalid user COadmin123 from 104.248.134.17 Sep 16 09:06:47 lcprod sshd\[26909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.17 |
2019-09-17 09:20:10 |
| 163.172.164.135 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-09-17 09:45:31 |
| 27.193.20.234 | attackspam | Unauthorised access (Sep 16) SRC=27.193.20.234 LEN=40 TTL=49 ID=49592 TCP DPT=23 WINDOW=12662 SYN Unauthorised access (Sep 15) SRC=27.193.20.234 LEN=40 TTL=49 ID=37496 TCP DPT=8080 WINDOW=8550 SYN |
2019-09-17 09:25:04 |
| 119.27.189.46 | attack | Sep 16 02:09:15 XXX sshd[28869]: Invalid user cirros from 119.27.189.46 port 55480 |
2019-09-17 09:57:17 |
| 164.132.192.219 | attack | Sep 17 01:22:33 SilenceServices sshd[30021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.192.219 Sep 17 01:22:35 SilenceServices sshd[30021]: Failed password for invalid user temp from 164.132.192.219 port 56028 ssh2 Sep 17 01:26:30 SilenceServices sshd[31522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.192.219 |
2019-09-17 09:16:43 |
| 112.64.170.166 | attackspambots | Sep 16 21:50:39 plusreed sshd[32155]: Invalid user marylyn from 112.64.170.166 ... |
2019-09-17 09:55:51 |
| 182.61.59.143 | attackspam | Sep 16 23:03:57 vtv3 sshd\[9069\]: Invalid user leagsoft from 182.61.59.143 port 39116 Sep 16 23:03:57 vtv3 sshd\[9069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.59.143 Sep 16 23:03:59 vtv3 sshd\[9069\]: Failed password for invalid user leagsoft from 182.61.59.143 port 39116 ssh2 Sep 16 23:06:49 vtv3 sshd\[10640\]: Invalid user harvey from 182.61.59.143 port 3193 Sep 16 23:06:49 vtv3 sshd\[10640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.59.143 Sep 16 23:17:33 vtv3 sshd\[15891\]: Invalid user design from 182.61.59.143 port 51360 Sep 16 23:17:33 vtv3 sshd\[15891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.59.143 Sep 16 23:17:36 vtv3 sshd\[15891\]: Failed password for invalid user design from 182.61.59.143 port 51360 ssh2 Sep 16 23:20:16 vtv3 sshd\[17419\]: Invalid user user1 from 182.61.59.143 port 15433 Sep 16 23:20:16 vtv3 sshd\[17419\]: |
2019-09-17 09:55:35 |
| 188.226.159.101 | attackbots | xmlrpc attack |
2019-09-17 09:41:08 |