城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.50.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.20.50.254. IN A
;; AUTHORITY SECTION:
. 478 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 07:17:58 CST 2022
;; MSG SIZE rcvd: 106
Host 254.50.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 254.50.20.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.1.242.11 | attack | Unauthorized connection attempt from IP address 1.1.242.11 on Port 445(SMB) |
2019-08-28 00:26:49 |
| 191.241.243.213 | attack | Unauthorized connection attempt from IP address 191.241.243.213 on Port 445(SMB) |
2019-08-28 00:52:03 |
| 109.125.128.53 | attackbotsspam | 2019-08-27 04:04:17 H=(localbus.it) [109.125.128.53]:59143 I=[192.147.25.65]:25 F= |
2019-08-28 00:15:10 |
| 167.114.152.139 | attackspambots | Aug 27 14:42:28 vps691689 sshd[3057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139 Aug 27 14:42:30 vps691689 sshd[3057]: Failed password for invalid user arma3 from 167.114.152.139 port 38956 ssh2 Aug 27 14:47:16 vps691689 sshd[3185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139 ... |
2019-08-28 01:10:20 |
| 103.54.225.10 | attack | Aug 27 19:24:01 srv-4 sshd\[25076\]: Invalid user kdh from 103.54.225.10 Aug 27 19:24:01 srv-4 sshd\[25076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.225.10 Aug 27 19:24:03 srv-4 sshd\[25076\]: Failed password for invalid user kdh from 103.54.225.10 port 10400 ssh2 ... |
2019-08-28 01:09:02 |
| 139.59.90.40 | attack | Aug 27 13:41:09 localhost sshd\[18727\]: Invalid user backlog from 139.59.90.40 Aug 27 13:41:09 localhost sshd\[18727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40 Aug 27 13:41:11 localhost sshd\[18727\]: Failed password for invalid user backlog from 139.59.90.40 port 16893 ssh2 Aug 27 13:45:46 localhost sshd\[18979\]: Invalid user dbmaker from 139.59.90.40 Aug 27 13:45:46 localhost sshd\[18979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40 ... |
2019-08-28 00:16:17 |
| 144.217.242.111 | attackspambots | Aug 27 10:36:13 vtv3 sshd\[1644\]: Invalid user kafka from 144.217.242.111 port 42178 Aug 27 10:36:13 vtv3 sshd\[1644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111 Aug 27 10:36:15 vtv3 sshd\[1644\]: Failed password for invalid user kafka from 144.217.242.111 port 42178 ssh2 Aug 27 10:44:00 vtv3 sshd\[5355\]: Invalid user windows from 144.217.242.111 port 36534 Aug 27 10:44:00 vtv3 sshd\[5355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111 Aug 27 10:55:33 vtv3 sshd\[11472\]: Invalid user him from 144.217.242.111 port 60074 Aug 27 10:55:33 vtv3 sshd\[11472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111 Aug 27 10:55:35 vtv3 sshd\[11472\]: Failed password for invalid user him from 144.217.242.111 port 60074 ssh2 Aug 27 10:59:39 vtv3 sshd\[13146\]: Invalid user ibm from 144.217.242.111 port 49108 Aug 27 10:59:39 vtv3 sshd\[13146 |
2019-08-28 01:01:26 |
| 197.95.193.173 | attackbots | Aug 27 08:32:02 debian sshd\[4208\]: Invalid user rony from 197.95.193.173 port 52726 Aug 27 08:32:02 debian sshd\[4208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.95.193.173 Aug 27 08:32:04 debian sshd\[4208\]: Failed password for invalid user rony from 197.95.193.173 port 52726 ssh2 ... |
2019-08-28 01:00:15 |
| 202.88.241.107 | attackbots | Aug 27 17:27:23 www sshd[17801]: refused connect from 202.88.241.107 (202.88.241.107) - 3 ssh attempts |
2019-08-28 00:19:40 |
| 124.65.152.14 | attack | 2019-08-27T10:07:22.358644hub.schaetter.us sshd\[26289\]: Invalid user httpd from 124.65.152.14 2019-08-27T10:07:22.395139hub.schaetter.us sshd\[26289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.65.152.14 2019-08-27T10:07:24.228227hub.schaetter.us sshd\[26289\]: Failed password for invalid user httpd from 124.65.152.14 port 56856 ssh2 2019-08-27T10:12:13.796722hub.schaetter.us sshd\[26313\]: Invalid user ene from 124.65.152.14 2019-08-27T10:12:13.821088hub.schaetter.us sshd\[26313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.65.152.14 ... |
2019-08-28 01:10:46 |
| 125.212.181.227 | attack | Unauthorized connection attempt from IP address 125.212.181.227 on Port 445(SMB) |
2019-08-28 00:39:47 |
| 27.78.22.59 | attackspambots | Unauthorized connection attempt from IP address 27.78.22.59 on Port 445(SMB) |
2019-08-28 00:34:53 |
| 104.148.70.72 | attack | 104.148.70.72 has been banned for [spam] ... |
2019-08-28 00:45:00 |
| 195.123.209.26 | attackspam | 19/8/27@05:04:00: FAIL: Alarm-Intrusion address from=195.123.209.26 ... |
2019-08-28 00:39:02 |
| 14.244.162.29 | attackspam | Unauthorized connection attempt from IP address 14.244.162.29 on Port 445(SMB) |
2019-08-28 01:09:54 |