城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.21.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.21.170. IN A
;; AUTHORITY SECTION:
. 416 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:54:13 CST 2022
;; MSG SIZE rcvd: 106
Host 170.21.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 170.21.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.88.112.75 | attack | May 10 2020, 17:44:27 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban. |
2020-05-11 01:52:44 |
| 197.240.170.178 | attack | scan r |
2020-05-11 01:50:42 |
| 171.237.58.150 | attackbots | Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn. |
2020-05-11 01:48:16 |
| 220.134.25.134 | attackbotsspam | Honeypot attack, port: 81, PTR: 220-134-25-134.HINET-IP.hinet.net. |
2020-05-11 02:03:05 |
| 62.42.5.118 | attackspambots | Honeypot attack, port: 81, PTR: 62.42.5.118.dyn.user.ono.com. |
2020-05-11 02:02:34 |
| 149.56.44.101 | attackbotsspam | May 10 14:55:42 meumeu sshd[13276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.101 May 10 14:55:44 meumeu sshd[13276]: Failed password for invalid user nginx from 149.56.44.101 port 52850 ssh2 May 10 14:56:36 meumeu sshd[13397]: Failed password for root from 149.56.44.101 port 37886 ssh2 ... |
2020-05-11 01:35:52 |
| 61.228.153.203 | attack | Honeypot attack, port: 445, PTR: 61-228-153-203.dynamic-ip.hinet.net. |
2020-05-11 01:40:26 |
| 68.183.19.84 | attackbotsspam | SSH brute-force: detected 22 distinct usernames within a 24-hour window. |
2020-05-11 01:41:51 |
| 72.38.192.163 | attackbots | Unauthorized connection attempt detected from IP address 72.38.192.163 to port 445 |
2020-05-11 02:16:35 |
| 104.131.231.109 | attack | Lines containing failures of 104.131.231.109 May 10 11:06:31 linuxrulz sshd[20969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.231.109 user=r.r May 10 11:06:33 linuxrulz sshd[20969]: Failed password for r.r from 104.131.231.109 port 38370 ssh2 May 10 11:06:34 linuxrulz sshd[20969]: Received disconnect from 104.131.231.109 port 38370:11: Bye Bye [preauth] May 10 11:06:34 linuxrulz sshd[20969]: Disconnected from authenticating user r.r 104.131.231.109 port 38370 [preauth] May 10 11:19:06 linuxrulz sshd[22480]: Invalid user rick from 104.131.231.109 port 44098 May 10 11:19:06 linuxrulz sshd[22480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.231.109 May 10 11:19:08 linuxrulz sshd[22480]: Failed password for invalid user rick from 104.131.231.109 port 44098 ssh2 May 10 11:19:09 linuxrulz sshd[22480]: Received disconnect from 104.131.231.109 port 44098:11: Bye Bye [preau........ ------------------------------ |
2020-05-11 01:42:55 |
| 49.176.175.223 | attack | Honeypot attack, port: 81, PTR: static-n49-176-175-223.mas2.nsw.optusnet.com.au. |
2020-05-11 01:52:09 |
| 104.248.10.181 | attackspambots |
|
2020-05-11 02:05:31 |
| 223.18.146.223 | attackbotsspam | Honeypot attack, port: 5555, PTR: 223-146-18-223-on-nets.com. |
2020-05-11 02:04:08 |
| 200.75.24.156 | attackbotsspam | Honeypot attack, port: 81, PTR: static.200.75.24.156.gtdinternet.com. |
2020-05-11 02:00:20 |
| 191.5.98.236 | attackbotsspam | Automatic report - Port Scan Attack |
2020-05-11 01:46:46 |