城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.205.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.129.205.50.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 15:59:50 CST 2022
;; MSG SIZE  rcvd: 107
        Host 50.205.129.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 50.205.129.104.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 45.80.65.80 | attack | Unauthorized connection attempt detected from IP address 45.80.65.80 to port 2220 [J]  | 
                    2020-02-02 07:29:29 | 
| 78.220.192.112 | attackbots | Feb 1 22:56:53 mout sshd[28988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.220.192.112 user=pi Feb 1 22:56:55 mout sshd[28988]: Failed password for pi from 78.220.192.112 port 48442 ssh2 Feb 1 22:56:55 mout sshd[28988]: Connection closed by 78.220.192.112 port 48442 [preauth]  | 
                    2020-02-02 07:57:48 | 
| 112.85.42.188 | attackbots | 02/01/2020-18:28:17.577188 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan  | 
                    2020-02-02 07:33:48 | 
| 54.219.186.207 | attackspambots | serveres are UTC Lines containing failures of 54.219.186.207 Feb 1 17:02:06 tux2 sshd[17691]: Invalid user teamspeak3 from 54.219.186.207 port 36558 Feb 1 17:02:06 tux2 sshd[17691]: Failed password for invalid user teamspeak3 from 54.219.186.207 port 36558 ssh2 Feb 1 17:02:06 tux2 sshd[17691]: Received disconnect from 54.219.186.207 port 36558:11: Bye Bye [preauth] Feb 1 17:02:06 tux2 sshd[17691]: Disconnected from invalid user teamspeak3 54.219.186.207 port 36558 [preauth] Feb 1 17:08:13 tux2 sshd[18061]: Failed password for r.r from 54.219.186.207 port 51548 ssh2 Feb 1 17:08:13 tux2 sshd[18061]: Received disconnect from 54.219.186.207 port 51548:11: Bye Bye [preauth] Feb 1 17:08:13 tux2 sshd[18061]: Disconnected from authenticating user r.r 54.219.186.207 port 51548 [preauth] Feb 1 17:10:43 tux2 sshd[18198]: Invalid user minecraft from 54.219.186.207 port 50132 Feb 1 17:10:43 tux2 sshd[18198]: Failed password for invalid user minecraft from 54.219.186.207 por........ ------------------------------  | 
                    2020-02-02 07:21:58 | 
| 118.70.123.224 | attackspam | Unauthorized connection attempt detected from IP address 118.70.123.224 to port 23 [T]  | 
                    2020-02-02 07:23:38 | 
| 67.205.153.16 | attackbotsspam | Invalid user polycom from 67.205.153.16 port 52820  | 
                    2020-02-02 07:42:56 | 
| 222.186.190.17 | attackbotsspam | Feb 1 22:58:06 ip-172-31-62-245 sshd\[24108\]: Failed password for root from 222.186.190.17 port 20242 ssh2\ Feb 1 22:58:20 ip-172-31-62-245 sshd\[24111\]: Failed password for root from 222.186.190.17 port 28332 ssh2\ Feb 1 23:01:40 ip-172-31-62-245 sshd\[24140\]: Failed password for root from 222.186.190.17 port 26174 ssh2\ Feb 1 23:02:05 ip-172-31-62-245 sshd\[24142\]: Failed password for root from 222.186.190.17 port 27587 ssh2\ Feb 1 23:02:08 ip-172-31-62-245 sshd\[24142\]: Failed password for root from 222.186.190.17 port 27587 ssh2\  | 
                    2020-02-02 07:27:17 | 
| 190.113.157.155 | attack | Unauthorized connection attempt detected from IP address 190.113.157.155 to port 2220 [J]  | 
                    2020-02-02 07:25:14 | 
| 5.188.210.190 | attackbotsspam | 02/01/2020-16:57:50.127715 5.188.210.190 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 9  | 
                    2020-02-02 07:32:59 | 
| 178.128.217.58 | attackbots | Unauthorized connection attempt detected from IP address 178.128.217.58 to port 2220 [J]  | 
                    2020-02-02 07:42:31 | 
| 104.37.216.112 | attack | 2020-02-01T17:16:00.159672vostok sshd\[1115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.37.216.112 user=root | Triggered by Fail2Ban at Vostok web server  | 
                    2020-02-02 07:48:19 | 
| 130.61.51.92 | attackspambots | Unauthorized connection attempt detected from IP address 130.61.51.92 to port 2220 [J]  | 
                    2020-02-02 07:37:40 | 
| 108.167.131.238 | attackspam | Fail2Ban Ban Triggered  | 
                    2020-02-02 07:28:52 | 
| 179.104.249.66 | attack | Automatic report - Port Scan Attack  | 
                    2020-02-02 07:13:41 | 
| 78.131.11.10 | attack | Unauthorized connection attempt detected from IP address 78.131.11.10 to port 22 [J]  | 
                    2020-02-02 07:29:52 |