城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.14.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.20.14.39. IN A
;; AUTHORITY SECTION:
. 535 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:27:49 CST 2022
;; MSG SIZE rcvd: 105
Host 39.14.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 39.14.20.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 123.14.193.239 | attackbots |
|
2020-09-19 17:48:43 |
| 129.154.67.65 | attack | Invalid user mkangethe from 129.154.67.65 port 17388 |
2020-09-19 17:13:00 |
| 37.187.7.95 | attack | Sep 19 10:38:56 ns381471 sshd[3314]: Failed password for root from 37.187.7.95 port 52688 ssh2 |
2020-09-19 17:20:56 |
| 117.199.41.230 | attackbots | 20/9/18@15:39:30: FAIL: IoT-Telnet address from=117.199.41.230 ... |
2020-09-19 17:28:19 |
| 193.169.253.35 | attackbots | [url=http://wrubel-jaroslaw-anwil.jaroslaw-wrobel.pl/]Jaroslaw;Wrobel[/url] |
2020-09-19 17:34:36 |
| 216.126.239.38 | attack | Sep 19 09:22:20 dev0-dcde-rnet sshd[27291]: Failed password for root from 216.126.239.38 port 44138 ssh2 Sep 19 09:26:31 dev0-dcde-rnet sshd[27321]: Failed password for root from 216.126.239.38 port 55712 ssh2 Sep 19 09:30:44 dev0-dcde-rnet sshd[27337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.239.38 |
2020-09-19 17:17:55 |
| 103.82.24.89 | attackspambots | 2020-09-19T09:12:52.759204shield sshd\[17298\]: Invalid user ftpuser from 103.82.24.89 port 43780 2020-09-19T09:12:52.768036shield sshd\[17298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.24.89 2020-09-19T09:12:55.064203shield sshd\[17298\]: Failed password for invalid user ftpuser from 103.82.24.89 port 43780 ssh2 2020-09-19T09:17:28.187707shield sshd\[19542\]: Invalid user ts from 103.82.24.89 port 56400 2020-09-19T09:17:28.195287shield sshd\[19542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.24.89 |
2020-09-19 17:33:35 |
| 94.25.171.6 | attackbots | 1600448384 - 09/18/2020 18:59:44 Host: 94.25.171.6/94.25.171.6 Port: 445 TCP Blocked |
2020-09-19 17:10:31 |
| 181.49.154.26 | attackbotsspam | Sep 19 11:21:18 sso sshd[12136]: Failed password for www-data from 181.49.154.26 port 40154 ssh2 Sep 19 11:25:00 sso sshd[12591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.154.26 ... |
2020-09-19 17:41:25 |
| 203.230.6.175 | attackbots | Sep 19 08:36:45 sip sshd[1654728]: Failed password for invalid user admin from 203.230.6.175 port 45962 ssh2 Sep 19 08:41:16 sip sshd[1654798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175 user=root Sep 19 08:41:18 sip sshd[1654798]: Failed password for root from 203.230.6.175 port 57418 ssh2 ... |
2020-09-19 17:26:02 |
| 142.93.193.63 | attackspambots | 142.93.193.63 - - [19/Sep/2020:07:59:14 +0000] "POST /wp-login.php HTTP/1.1" 200 2075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 142.93.193.63 - - [19/Sep/2020:07:59:16 +0000] "POST /wp-login.php HTTP/1.1" 200 2052 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 142.93.193.63 - - [19/Sep/2020:07:59:19 +0000] "POST /wp-login.php HTTP/1.1" 200 2049 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 142.93.193.63 - - [19/Sep/2020:07:59:21 +0000] "POST /wp-login.php HTTP/1.1" 200 2049 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 142.93.193.63 - - [19/Sep/2020:07:59:22 +0000] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" |
2020-09-19 17:44:54 |
| 122.51.92.116 | attackspam | Sep 19 10:07:08 ovpn sshd\[22634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116 user=root Sep 19 10:07:10 ovpn sshd\[22634\]: Failed password for root from 122.51.92.116 port 52822 ssh2 Sep 19 10:13:06 ovpn sshd\[24077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116 user=root Sep 19 10:13:08 ovpn sshd\[24077\]: Failed password for root from 122.51.92.116 port 39424 ssh2 Sep 19 10:15:49 ovpn sshd\[24787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116 user=root |
2020-09-19 17:20:27 |
| 115.97.64.87 | attackspam | DATE:2020-09-18 18:59:18, IP:115.97.64.87, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2020-09-19 17:32:20 |
| 107.170.18.163 | attackspambots | Sep 19 11:18:26 abendstille sshd\[26734\]: Invalid user nagios from 107.170.18.163 Sep 19 11:18:26 abendstille sshd\[26734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.18.163 Sep 19 11:18:27 abendstille sshd\[26734\]: Failed password for invalid user nagios from 107.170.18.163 port 52365 ssh2 Sep 19 11:28:01 abendstille sshd\[3090\]: Invalid user tomcat from 107.170.18.163 Sep 19 11:28:01 abendstille sshd\[3090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.18.163 ... |
2020-09-19 17:36:26 |
| 23.225.240.242 | attack |
|
2020-09-19 17:40:01 |