城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.207.140.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.207.140.198.		IN	A
;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:52:30 CST 2022
;; MSG SIZE  rcvd: 108198.140.207.104.in-addr.arpa domain name pointer 104.207.140.198.vultr.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
198.140.207.104.in-addr.arpa	name = 104.207.140.198.vultr.com.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 210.16.187.206 | attackbotsspam | Bruteforce detected by fail2ban | 2020-08-06 08:41:13 | 
| 104.248.114.67 | attackspam | Aug 6 02:08:06 piServer sshd[28798]: Failed password for root from 104.248.114.67 port 39580 ssh2 Aug 6 02:10:49 piServer sshd[29223]: Failed password for root from 104.248.114.67 port 58714 ssh2 ... | 2020-08-06 08:52:50 | 
| 61.177.172.41 | attackbots | Aug 6 05:08:08 gw1 sshd[4439]: Failed password for root from 61.177.172.41 port 34337 ssh2 Aug 6 05:08:24 gw1 sshd[4439]: error: maximum authentication attempts exceeded for root from 61.177.172.41 port 34337 ssh2 [preauth] ... | 2020-08-06 08:24:11 | 
| 150.101.108.160 | attack | Ssh brute force | 2020-08-06 08:43:16 | 
| 222.186.180.147 | attack | $f2bV_matches | 2020-08-06 08:34:03 | 
| 23.105.196.142 | attackbots | SSH brutforce | 2020-08-06 12:05:00 | 
| 104.131.45.150 | attack | Lines containing failures of 104.131.45.150 Aug 3 00:07:20 shared02 sshd[17393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.45.150 user=r.r Aug 3 00:07:22 shared02 sshd[17393]: Failed password for r.r from 104.131.45.150 port 41584 ssh2 Aug 3 00:07:22 shared02 sshd[17393]: Received disconnect from 104.131.45.150 port 41584:11: Bye Bye [preauth] Aug 3 00:07:22 shared02 sshd[17393]: Disconnected from authenticating user r.r 104.131.45.150 port 41584 [preauth] Aug 3 00:18:21 shared02 sshd[23428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.45.150 user=r.r Aug 3 00:18:23 shared02 sshd[23428]: Failed password for r.r from 104.131.45.150 port 33536 ssh2 Aug 3 00:18:23 shared02 sshd[23428]: Received disconnect from 104.131.45.150 port 33536:11: Bye Bye [preauth] Aug 3 00:18:23 shared02 sshd[23428]: Disconnected from authenticating user r.r 104.131.45.150 port 33536........ ------------------------------ | 2020-08-06 08:44:38 | 
| 47.116.5.6 | attackbotsspam | Failed password for root from 47.116.5.6 port 52948 ssh2 | 2020-08-06 08:38:33 | 
| 103.228.53.59 | attackbots | 20/8/5@23:55:51: FAIL: Alarm-Intrusion address from=103.228.53.59 ... | 2020-08-06 12:04:08 | 
| 218.92.0.220 | attack | Aug 5 23:56:34 NPSTNNYC01T sshd[6195]: Failed password for root from 218.92.0.220 port 60659 ssh2 Aug 5 23:56:49 NPSTNNYC01T sshd[6220]: Failed password for root from 218.92.0.220 port 57431 ssh2 ... | 2020-08-06 12:01:09 | 
| 67.201.8.10 | attackspambots | 2020-08-05T22:36:08.377960vfs-server-01 sshd\[2092\]: Invalid user admin from 67.201.8.10 port 53511 2020-08-05T22:36:09.805045vfs-server-01 sshd\[2096\]: Invalid user admin from 67.201.8.10 port 53531 2020-08-05T22:36:11.222714vfs-server-01 sshd\[2099\]: Invalid user admin from 67.201.8.10 port 53556 | 2020-08-06 08:32:44 | 
| 206.189.126.247 | attackbotsspam | Port scan: Attack repeated for 24 hours | 2020-08-06 08:33:40 | 
| 94.79.55.192 | attackspambots | 2020-08-06T03:47:19.187497shield sshd\[26698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.79.55.192 user=root 2020-08-06T03:47:21.475165shield sshd\[26698\]: Failed password for root from 94.79.55.192 port 44928 ssh2 2020-08-06T03:51:43.874417shield sshd\[27056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.79.55.192 user=root 2020-08-06T03:51:45.742262shield sshd\[27056\]: Failed password for root from 94.79.55.192 port 49702 ssh2 2020-08-06T03:55:52.885096shield sshd\[27363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.79.55.192 user=root | 2020-08-06 12:02:05 | 
| 14.160.23.170 | attackbots | failed_logins | 2020-08-06 08:40:06 | 
| 124.83.34.38 | attackspambots | Attempts against non-existent wp-login | 2020-08-06 08:51:34 |