城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.21.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.18.21.91. IN A
;; AUTHORITY SECTION:
. 428 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 12:00:34 CST 2022
;; MSG SIZE rcvd: 105
Host 91.21.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.21.18.104.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
185.39.11.47 | attack | Persistent port scanning [20 denied] |
2020-06-17 13:37:31 |
51.75.131.235 | attackspam | Jun 17 06:01:44 * sshd[30946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.131.235 Jun 17 06:01:46 * sshd[30946]: Failed password for invalid user rohan from 51.75.131.235 port 51108 ssh2 |
2020-06-17 13:29:59 |
51.178.55.147 | attack | 2020-06-16T22:51:51.250076server.mjenks.net sshd[1210563]: Invalid user mc3 from 51.178.55.147 port 47072 2020-06-16T22:51:51.255365server.mjenks.net sshd[1210563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.55.147 2020-06-16T22:51:51.250076server.mjenks.net sshd[1210563]: Invalid user mc3 from 51.178.55.147 port 47072 2020-06-16T22:51:53.455153server.mjenks.net sshd[1210563]: Failed password for invalid user mc3 from 51.178.55.147 port 47072 ssh2 2020-06-16T22:55:06.055668server.mjenks.net sshd[1210946]: Invalid user kyle from 51.178.55.147 port 48908 ... |
2020-06-17 13:49:17 |
68.183.181.7 | attackbotsspam | Jun 17 07:55:08 lukav-desktop sshd\[22173\]: Invalid user zhangjie from 68.183.181.7 Jun 17 07:55:08 lukav-desktop sshd\[22173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.181.7 Jun 17 07:55:09 lukav-desktop sshd\[22173\]: Failed password for invalid user zhangjie from 68.183.181.7 port 43148 ssh2 Jun 17 07:57:19 lukav-desktop sshd\[22237\]: Invalid user kyr from 68.183.181.7 Jun 17 07:57:19 lukav-desktop sshd\[22237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.181.7 |
2020-06-17 13:50:22 |
40.88.132.231 | attackbots | Unauthorized connection attempt detected from IP address 40.88.132.231 to port 22 |
2020-06-17 13:36:23 |
213.154.11.207 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-06-17 13:27:18 |
191.162.237.146 | attack | Auto Fail2Ban report, multiple SSH login attempts. |
2020-06-17 13:34:32 |
222.186.42.137 | attackbotsspam | 2020-06-17T07:19:30.751339sd-86998 sshd[39264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root 2020-06-17T07:19:32.920531sd-86998 sshd[39264]: Failed password for root from 222.186.42.137 port 63399 ssh2 2020-06-17T07:19:35.424214sd-86998 sshd[39264]: Failed password for root from 222.186.42.137 port 63399 ssh2 2020-06-17T07:19:30.751339sd-86998 sshd[39264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root 2020-06-17T07:19:32.920531sd-86998 sshd[39264]: Failed password for root from 222.186.42.137 port 63399 ssh2 2020-06-17T07:19:35.424214sd-86998 sshd[39264]: Failed password for root from 222.186.42.137 port 63399 ssh2 2020-06-17T07:19:30.751339sd-86998 sshd[39264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root 2020-06-17T07:19:32.920531sd-86998 sshd[39264]: Failed password for root from ... |
2020-06-17 13:24:52 |
51.77.150.203 | attackspambots | Invalid user wei from 51.77.150.203 port 58136 |
2020-06-17 13:29:29 |
115.29.246.243 | attackbotsspam | 2020-06-17T04:49:46.984901mail.csmailer.org sshd[2156]: Failed password for root from 115.29.246.243 port 37590 ssh2 2020-06-17T04:52:57.529266mail.csmailer.org sshd[2517]: Invalid user t2 from 115.29.246.243 port 60180 2020-06-17T04:52:57.531907mail.csmailer.org sshd[2517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.246.243 2020-06-17T04:52:57.529266mail.csmailer.org sshd[2517]: Invalid user t2 from 115.29.246.243 port 60180 2020-06-17T04:52:59.676050mail.csmailer.org sshd[2517]: Failed password for invalid user t2 from 115.29.246.243 port 60180 ssh2 ... |
2020-06-17 13:31:32 |
157.230.150.102 | attackspam | Jun 17 05:36:01 web8 sshd\[29703\]: Invalid user db2inst from 157.230.150.102 Jun 17 05:36:01 web8 sshd\[29703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.150.102 Jun 17 05:36:03 web8 sshd\[29703\]: Failed password for invalid user db2inst from 157.230.150.102 port 56726 ssh2 Jun 17 05:39:24 web8 sshd\[31519\]: Invalid user ed from 157.230.150.102 Jun 17 05:39:24 web8 sshd\[31519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.150.102 |
2020-06-17 13:48:11 |
134.73.5.117 | attackbotsspam | Jun 17 06:57:30 sso sshd[20682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.5.117 Jun 17 06:57:32 sso sshd[20682]: Failed password for invalid user tms from 134.73.5.117 port 48766 ssh2 ... |
2020-06-17 13:32:42 |
104.236.244.98 | attack | Jun 17 07:31:04 eventyay sshd[27686]: Failed password for root from 104.236.244.98 port 35100 ssh2 Jun 17 07:34:57 eventyay sshd[27795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.244.98 Jun 17 07:34:59 eventyay sshd[27795]: Failed password for invalid user hpsmh from 104.236.244.98 port 35644 ssh2 ... |
2020-06-17 13:47:45 |
45.238.232.42 | attack | Jun 17 13:44:13 web1 sshd[26931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.238.232.42 user=root Jun 17 13:44:16 web1 sshd[26931]: Failed password for root from 45.238.232.42 port 52322 ssh2 Jun 17 13:51:28 web1 sshd[28719]: Invalid user ts from 45.238.232.42 port 54742 Jun 17 13:51:28 web1 sshd[28719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.238.232.42 Jun 17 13:51:28 web1 sshd[28719]: Invalid user ts from 45.238.232.42 port 54742 Jun 17 13:51:30 web1 sshd[28719]: Failed password for invalid user ts from 45.238.232.42 port 54742 ssh2 Jun 17 13:55:17 web1 sshd[29690]: Invalid user ftpuser2 from 45.238.232.42 port 53628 Jun 17 13:55:17 web1 sshd[29690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.238.232.42 Jun 17 13:55:17 web1 sshd[29690]: Invalid user ftpuser2 from 45.238.232.42 port 53628 Jun 17 13:55:19 web1 sshd[29690]: Failed password ... |
2020-06-17 13:38:50 |
77.247.110.103 | attackspambots | firewall-block, port(s): 20707/udp |
2020-06-17 13:33:18 |