城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.98.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.19.98.53. IN A
;; AUTHORITY SECTION:
. 213 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 07:50:27 CST 2022
;; MSG SIZE rcvd: 105
Host 53.98.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 53.98.19.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 205.185.122.238 | attack | *Port Scan* detected from 205.185.122.238 (US/United States/edu.alphabluehost.com). 11 hits in the last 151 seconds |
2020-05-11 23:56:10 |
| 217.182.16.182 | attackspam | Lines containing failures of 217.182.16.182 May 11 11:14:37 kmh-wmh-001-nbg01 sshd[31487]: Did not receive identification string from 217.182.16.182 port 42024 May 11 11:16:10 kmh-wmh-001-nbg01 sshd[31707]: Invalid user bad from 217.182.16.182 port 53988 May 11 11:16:10 kmh-wmh-001-nbg01 sshd[31707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.16.182 May 11 11:16:11 kmh-wmh-001-nbg01 sshd[31707]: Failed password for invalid user bad from 217.182.16.182 port 53988 ssh2 May 11 11:16:12 kmh-wmh-001-nbg01 sshd[31707]: Received disconnect from 217.182.16.182 port 53988:11: Normal Shutdown, Thank you for playing [preauth] May 11 11:16:12 kmh-wmh-001-nbg01 sshd[31707]: Disconnected from invalid user bad 217.182.16.182 port 53988 [preauth] May 11 11:16:50 kmh-wmh-001-nbg01 sshd[31764]: Invalid user testdev from 217.182.16.182 port 48644 May 11 11:16:50 kmh-wmh-001-nbg01 sshd[31764]: pam_unix(sshd:auth): authentication failure;........ ------------------------------ |
2020-05-11 23:51:38 |
| 102.41.61.142 | attackspam | 1589198729 - 05/11/2020 14:05:29 Host: 102.41.61.142/102.41.61.142 Port: 445 TCP Blocked |
2020-05-12 00:13:52 |
| 185.143.75.81 | attack | "fail2ban match" |
2020-05-12 00:19:37 |
| 156.96.45.247 | attackbots | [2020-05-11 11:38:57] NOTICE[1157][C-000031bf] chan_sip.c: Call from '' (156.96.45.247:65227) to extension '011441977879416' rejected because extension not found in context 'public'. [2020-05-11 11:38:57] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-11T11:38:57.145-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441977879416",SessionID="0x7f5f107b3898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.45.247/65227",ACLName="no_extension_match" [2020-05-11 11:40:01] NOTICE[1157][C-000031c3] chan_sip.c: Call from '' (156.96.45.247:55767) to extension '9011441977879416' rejected because extension not found in context 'public'. [2020-05-11 11:40:01] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-11T11:40:01.801-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441977879416",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD ... |
2020-05-11 23:44:22 |
| 218.92.0.208 | attackbots | May 11 17:29:34 server sshd[1746]: Failed password for root from 218.92.0.208 port 55954 ssh2 May 11 17:29:36 server sshd[1746]: Failed password for root from 218.92.0.208 port 55954 ssh2 May 11 17:29:39 server sshd[1746]: Failed password for root from 218.92.0.208 port 55954 ssh2 |
2020-05-11 23:52:02 |
| 93.174.93.195 | attackspambots | 05/11/2020-11:29:41.400001 93.174.93.195 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-05-11 23:46:13 |
| 118.70.185.229 | attackbotsspam | May 11 12:06:58 124388 sshd[32248]: Invalid user avorion from 118.70.185.229 port 40510 May 11 12:06:58 124388 sshd[32248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.185.229 May 11 12:06:58 124388 sshd[32248]: Invalid user avorion from 118.70.185.229 port 40510 May 11 12:06:59 124388 sshd[32248]: Failed password for invalid user avorion from 118.70.185.229 port 40510 ssh2 May 11 12:11:13 124388 sshd[32731]: Invalid user paypal from 118.70.185.229 port 49386 |
2020-05-11 23:39:24 |
| 106.54.114.164 | attackspam | Lines containing failures of 106.54.114.164 May 11 12:44:04 *** sshd[113908]: Invalid user test from 106.54.114.164 port 44690 May 11 12:44:04 *** sshd[113908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.164 May 11 12:44:06 *** sshd[113908]: Failed password for invalid user test from 106.54.114.164 port 44690 ssh2 May 11 12:44:07 *** sshd[113908]: Received disconnect from 106.54.114.164 port 44690:11: Bye Bye [preauth] May 11 12:44:07 *** sshd[113908]: Disconnected from invalid user test 106.54.114.164 port 44690 [preauth] May 11 12:48:55 *** sshd[114227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.164 user=r.r May 11 12:48:57 *** sshd[114227]: Failed password for r.r from 106.54.114.164 port 56226 ssh2 May 11 12:48:58 *** sshd[114227]: Received disconnect from 106.54.114.164 port 56226:11: Bye Bye [preauth] May 11 12:48:58 *** sshd[114227]: Disconnected from ........ ------------------------------ |
2020-05-12 00:15:21 |
| 181.91.135.116 | attackspam | Unauthorized connection attempt from IP address 181.91.135.116 on Port 445(SMB) |
2020-05-11 23:44:00 |
| 211.157.164.162 | attackbots | 2020-05-11T13:55:57.133977ns386461 sshd\[7969\]: Invalid user test from 211.157.164.162 port 63533 2020-05-11T13:55:57.138691ns386461 sshd\[7969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.164.162 2020-05-11T13:55:59.218583ns386461 sshd\[7969\]: Failed password for invalid user test from 211.157.164.162 port 63533 ssh2 2020-05-11T14:11:11.477654ns386461 sshd\[22271\]: Invalid user anna from 211.157.164.162 port 21528 2020-05-11T14:11:11.482159ns386461 sshd\[22271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.164.162 ... |
2020-05-12 00:03:35 |
| 106.13.228.21 | attack | k+ssh-bruteforce |
2020-05-12 00:06:03 |
| 125.124.193.237 | attackbotsspam | May 11 14:11:05 scw-6657dc sshd[818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.193.237 May 11 14:11:05 scw-6657dc sshd[818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.193.237 May 11 14:11:07 scw-6657dc sshd[818]: Failed password for invalid user weblogic from 125.124.193.237 port 34590 ssh2 ... |
2020-05-12 00:04:49 |
| 91.202.230.152 | attackspam | 20/5/11@08:05:37: FAIL: Alarm-Intrusion address from=91.202.230.152 ... |
2020-05-12 00:07:03 |
| 223.149.201.51 | attackbots | Unauthorized connection attempt detected from IP address 223.149.201.51 to port 23 [T] |
2020-05-11 23:49:49 |