城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.13.93.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.13.93.246. IN A
;; AUTHORITY SECTION:
. 553 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:38:23 CST 2022
;; MSG SIZE rcvd: 106
246.93.13.104.in-addr.arpa domain name pointer 104-13-93-246.lightspeed.tukrga.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
246.93.13.104.in-addr.arpa name = 104-13-93-246.lightspeed.tukrga.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 68.193.248.52 | attackbotsspam | trying to access non-authorized port |
2020-07-23 07:10:11 |
| 191.254.129.163 | attackspam | Unauthorized connection attempt detected from IP address 191.254.129.163 to port 8080 |
2020-07-23 06:48:11 |
| 45.95.168.168 | attackbots | DATE:2020-07-23 00:55:23, IP:45.95.168.168, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2020-07-23 07:20:56 |
| 93.38.114.55 | attack | Invalid user board from 93.38.114.55 port 36501 |
2020-07-23 07:25:17 |
| 170.106.76.22 | attackspam | Unauthorized connection attempt detected from IP address 170.106.76.22 to port 12000 |
2020-07-23 06:52:04 |
| 223.83.138.104 | attackbots | Jul 22 23:01:16 ws26vmsma01 sshd[23155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.83.138.104 Jul 22 23:01:18 ws26vmsma01 sshd[23155]: Failed password for invalid user support from 223.83.138.104 port 58680 ssh2 ... |
2020-07-23 07:16:04 |
| 150.158.197.126 | attack | Unauthorized connection attempt detected from IP address 150.158.197.126 to port 9200 |
2020-07-23 06:53:36 |
| 128.72.246.94 | attack | Failed RDP login |
2020-07-23 07:22:06 |
| 122.154.103.70 | attackspam | Failed RDP login |
2020-07-23 07:12:29 |
| 180.76.134.43 | attackspambots | Jul 23 01:55:16 mail postfix/smtpd[310355]: warning: unknown[180.76.134.43]: SASL LOGIN authentication failed: authentication failure Jul 23 01:55:20 mail postfix/smtpd[310355]: warning: unknown[180.76.134.43]: SASL LOGIN authentication failed: authentication failure Jul 23 01:55:23 mail postfix/smtpd[310355]: warning: unknown[180.76.134.43]: SASL LOGIN authentication failed: authentication failure ... |
2020-07-23 07:19:00 |
| 54.71.115.235 | attackbots | 54.71.115.235 - - [23/Jul/2020:00:55:32 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.71.115.235 - - [23/Jul/2020:00:55:33 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.71.115.235 - - [23/Jul/2020:00:55:33 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.71.115.235 - - [23/Jul/2020:00:55:34 +0200] "POST /wp-login.php HTTP/1.1" 200 2007 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.71.115.235 - - [23/Jul/2020:00:55:34 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.71.115.235 - - [23/Jul/2020:00:55:34 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir ... |
2020-07-23 07:03:34 |
| 138.68.92.121 | attack | Jul 23 00:44:35 vps sshd[314513]: Failed password for invalid user jordan from 138.68.92.121 port 57800 ssh2 Jul 23 00:50:06 vps sshd[340840]: Invalid user laboratorio from 138.68.92.121 port 45288 Jul 23 00:50:06 vps sshd[340840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121 Jul 23 00:50:08 vps sshd[340840]: Failed password for invalid user laboratorio from 138.68.92.121 port 45288 ssh2 Jul 23 00:55:37 vps sshd[366277]: Invalid user hassan from 138.68.92.121 port 32782 ... |
2020-07-23 06:59:37 |
| 193.124.58.83 | attackspam | Failed RDP login |
2020-07-23 07:17:21 |
| 193.218.118.130 | attack | Jul 23 00:55:27 mellenthin sshd[30878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.218.118.130 user=root Jul 23 00:55:28 mellenthin sshd[30878]: Failed password for invalid user root from 193.218.118.130 port 50740 ssh2 |
2020-07-23 07:09:04 |
| 168.128.70.151 | attackspam | Jul 22 19:00:23 ny01 sshd[27885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.70.151 Jul 22 19:00:25 ny01 sshd[27885]: Failed password for invalid user orion from 168.128.70.151 port 52680 ssh2 Jul 22 19:03:27 ny01 sshd[28213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.70.151 |
2020-07-23 07:19:13 |