城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.207.48.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.207.48.94. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:11:33 CST 2025
;; MSG SIZE rcvd: 106
Host 94.48.207.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.48.207.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.100.211.119 | attack | Unauthorized access or intrusion attempt detected from Thor banned IP |
2020-04-05 12:08:40 |
| 181.48.67.89 | attack | Apr 5 05:39:44 ovpn sshd\[25234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.67.89 user=root Apr 5 05:39:46 ovpn sshd\[25234\]: Failed password for root from 181.48.67.89 port 36786 ssh2 Apr 5 05:53:41 ovpn sshd\[28756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.67.89 user=root Apr 5 05:53:43 ovpn sshd\[28756\]: Failed password for root from 181.48.67.89 port 55102 ssh2 Apr 5 05:58:17 ovpn sshd\[29974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.67.89 user=root |
2020-04-05 12:27:32 |
| 222.186.169.194 | attackspambots | Apr 5 07:10:12 ift sshd\[29938\]: Failed password for root from 222.186.169.194 port 38678 ssh2Apr 5 07:10:15 ift sshd\[29938\]: Failed password for root from 222.186.169.194 port 38678 ssh2Apr 5 07:10:19 ift sshd\[29938\]: Failed password for root from 222.186.169.194 port 38678 ssh2Apr 5 07:10:21 ift sshd\[29938\]: Failed password for root from 222.186.169.194 port 38678 ssh2Apr 5 07:10:25 ift sshd\[29938\]: Failed password for root from 222.186.169.194 port 38678 ssh2 ... |
2020-04-05 12:17:55 |
| 123.30.154.184 | attack | $f2bV_matches |
2020-04-05 12:38:20 |
| 59.47.38.99 | attackbotsspam | CN_APNIC-HM_<177>1586059104 [1:2403388:56467] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 45 [Classification: Misc Attack] [Priority: 2]: |
2020-04-05 12:20:32 |
| 222.124.22.43 | attackbotsspam | Apr 5 05:58:28 hell sshd[1380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.22.43 Apr 5 05:58:30 hell sshd[1380]: Failed password for invalid user tomcat from 222.124.22.43 port 49146 ssh2 ... |
2020-04-05 12:14:54 |
| 137.74.195.204 | attackspam | Apr 5 05:56:18 plex sshd[32415]: Failed password for invalid user phion from 137.74.195.204 port 34424 ssh2 Apr 5 05:58:04 plex sshd[32479]: Invalid user daniel from 137.74.195.204 port 54426 Apr 5 05:58:04 plex sshd[32479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.195.204 Apr 5 05:58:04 plex sshd[32479]: Invalid user daniel from 137.74.195.204 port 54426 Apr 5 05:58:06 plex sshd[32479]: Failed password for invalid user daniel from 137.74.195.204 port 54426 ssh2 |
2020-04-05 12:33:41 |
| 140.143.127.179 | attack | Invalid user nse from 140.143.127.179 port 36210 |
2020-04-05 12:10:33 |
| 49.88.112.65 | attack | Apr 5 06:55:11 pkdns2 sshd\[54396\]: Failed password for root from 49.88.112.65 port 63626 ssh2Apr 5 06:56:36 pkdns2 sshd\[54461\]: Failed password for root from 49.88.112.65 port 38444 ssh2Apr 5 06:56:38 pkdns2 sshd\[54461\]: Failed password for root from 49.88.112.65 port 38444 ssh2Apr 5 06:56:41 pkdns2 sshd\[54461\]: Failed password for root from 49.88.112.65 port 38444 ssh2Apr 5 06:57:15 pkdns2 sshd\[54493\]: Failed password for root from 49.88.112.65 port 27217 ssh2Apr 5 06:58:37 pkdns2 sshd\[54545\]: Failed password for root from 49.88.112.65 port 62240 ssh2 ... |
2020-04-05 12:11:31 |
| 159.203.63.125 | attackbotsspam | Apr 5 06:04:10 srv01 sshd[8187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125 user=root Apr 5 06:04:12 srv01 sshd[8187]: Failed password for root from 159.203.63.125 port 41457 ssh2 Apr 5 06:08:20 srv01 sshd[8457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125 user=root Apr 5 06:08:22 srv01 sshd[8457]: Failed password for root from 159.203.63.125 port 46604 ssh2 Apr 5 06:12:28 srv01 sshd[8835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125 user=root Apr 5 06:12:29 srv01 sshd[8835]: Failed password for root from 159.203.63.125 port 51749 ssh2 ... |
2020-04-05 12:24:41 |
| 106.12.88.232 | attack | 2020-04-05T04:33:42.368273shield sshd\[1506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232 user=root 2020-04-05T04:33:44.241873shield sshd\[1506\]: Failed password for root from 106.12.88.232 port 53374 ssh2 2020-04-05T04:38:12.054286shield sshd\[2844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232 user=root 2020-04-05T04:38:13.661630shield sshd\[2844\]: Failed password for root from 106.12.88.232 port 55368 ssh2 2020-04-05T04:42:41.225736shield sshd\[4037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232 user=root |
2020-04-05 12:43:27 |
| 94.154.239.69 | attackbots | 20 attempts against mh-misbehave-ban on twig |
2020-04-05 12:16:46 |
| 1.193.39.196 | attack | 2020-04-05T05:53:42.345213struts4.enskede.local sshd\[1091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.39.196 user=root 2020-04-05T05:53:45.441401struts4.enskede.local sshd\[1091\]: Failed password for root from 1.193.39.196 port 58590 ssh2 2020-04-05T05:59:33.281286struts4.enskede.local sshd\[1290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.39.196 user=root 2020-04-05T05:59:36.656088struts4.enskede.local sshd\[1290\]: Failed password for root from 1.193.39.196 port 47972 ssh2 2020-04-05T06:03:23.017218struts4.enskede.local sshd\[1452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.39.196 user=root ... |
2020-04-05 12:17:28 |
| 202.73.42.154 | attack | 2020-04-05T04:10:50.430926shield sshd\[28064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.42.154 user=root 2020-04-05T04:10:51.953199shield sshd\[28064\]: Failed password for root from 202.73.42.154 port 32865 ssh2 2020-04-05T04:15:05.305538shield sshd\[29056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.42.154 user=root 2020-04-05T04:15:07.833846shield sshd\[29056\]: Failed password for root from 202.73.42.154 port 10180 ssh2 2020-04-05T04:19:10.436826shield sshd\[30228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.42.154 user=root |
2020-04-05 12:24:12 |
| 51.75.141.202 | attackspambots | Apr 5 06:29:26 OPSO sshd\[19325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.141.202 user=root Apr 5 06:29:28 OPSO sshd\[19325\]: Failed password for root from 51.75.141.202 port 34456 ssh2 Apr 5 06:33:20 OPSO sshd\[19919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.141.202 user=root Apr 5 06:33:22 OPSO sshd\[19919\]: Failed password for root from 51.75.141.202 port 46320 ssh2 Apr 5 06:37:13 OPSO sshd\[20454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.141.202 user=root |
2020-04-05 12:46:53 |