城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.0.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1861
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.20.0.94. IN A
;; AUTHORITY SECTION:
. 118 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 06:32:51 CST 2022
;; MSG SIZE rcvd: 104
Host 94.0.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.0.20.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 148.70.111.66 | attackbotsspam | firewall-block, port(s): 8040/tcp |
2019-11-09 21:03:55 |
| 62.234.109.203 | attackspam | detected by Fail2Ban |
2019-11-09 21:04:53 |
| 222.186.190.2 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Failed password for root from 222.186.190.2 port 51262 ssh2 Failed password for root from 222.186.190.2 port 51262 ssh2 Failed password for root from 222.186.190.2 port 51262 ssh2 Failed password for root from 222.186.190.2 port 51262 ssh2 |
2019-11-09 20:26:40 |
| 106.13.81.242 | attackspambots | Nov 8 21:40:11 php1 sshd\[8247\]: Invalid user karleigh from 106.13.81.242 Nov 8 21:40:11 php1 sshd\[8247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242 Nov 8 21:40:12 php1 sshd\[8247\]: Failed password for invalid user karleigh from 106.13.81.242 port 54214 ssh2 Nov 8 21:45:26 php1 sshd\[9154\]: Invalid user rator from 106.13.81.242 Nov 8 21:45:26 php1 sshd\[9154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242 |
2019-11-09 21:04:25 |
| 218.71.84.174 | attackbots | FTP/21 MH Probe, BF, Hack - |
2019-11-09 20:33:40 |
| 109.194.78.94 | attackspam | [portscan] Port scan |
2019-11-09 21:09:42 |
| 122.51.31.215 | attack | TCP Port Scanning |
2019-11-09 20:51:28 |
| 89.22.254.55 | attack | $f2bV_matches |
2019-11-09 20:39:41 |
| 145.239.95.83 | attackspambots | $f2bV_matches |
2019-11-09 21:09:28 |
| 45.143.220.19 | attackspam | firewall-block, port(s): 5060/udp |
2019-11-09 20:31:15 |
| 51.91.19.20 | attackbots | Automatic report - XMLRPC Attack |
2019-11-09 20:37:52 |
| 91.221.132.107 | attackspam | SSH invalid-user multiple login try |
2019-11-09 20:59:22 |
| 185.216.140.252 | attackspambots | 3389BruteforceFW23 |
2019-11-09 20:27:22 |
| 98.124.25.245 | attack | Unauthorized IMAP connection attempt |
2019-11-09 21:11:52 |
| 165.22.195.163 | attackbotsspam | Wordpress brute-force |
2019-11-09 21:00:05 |