城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.234.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.234.42. IN A
;; AUTHORITY SECTION:
. 162 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:34:02 CST 2022
;; MSG SIZE rcvd: 106
Host 42.234.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.234.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.228.198.176 | attack | 2019-09-21 12:27:31,015 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.228.198.176 2019-09-21 13:00:53,277 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.228.198.176 2019-09-21 13:31:19,724 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.228.198.176 2019-09-21 14:05:09,805 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.228.198.176 2019-09-21 14:35:35,898 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.228.198.176 ... |
2019-09-22 22:33:19 |
| 89.46.101.122 | attackbots | 2019-09-20 03:48:33,655 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 04:38:59,806 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 05:23:11,184 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 06:06:55,618 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 06:49:35,029 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 ... |
2019-09-22 22:39:46 |
| 46.105.122.127 | attack | Sep 22 10:20:23 xtremcommunity sshd\[361550\]: Invalid user zm from 46.105.122.127 port 45174 Sep 22 10:20:23 xtremcommunity sshd\[361550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.122.127 Sep 22 10:20:25 xtremcommunity sshd\[361550\]: Failed password for invalid user zm from 46.105.122.127 port 45174 ssh2 Sep 22 10:24:26 xtremcommunity sshd\[361622\]: Invalid user transport from 46.105.122.127 port 56996 Sep 22 10:24:26 xtremcommunity sshd\[361622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.122.127 ... |
2019-09-22 22:30:20 |
| 51.158.189.0 | attackspam | Sep 22 17:29:42 site3 sshd\[230131\]: Invalid user ok from 51.158.189.0 Sep 22 17:29:42 site3 sshd\[230131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.189.0 Sep 22 17:29:44 site3 sshd\[230131\]: Failed password for invalid user ok from 51.158.189.0 port 35366 ssh2 Sep 22 17:33:33 site3 sshd\[230166\]: Invalid user semik from 51.158.189.0 Sep 22 17:33:33 site3 sshd\[230166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.189.0 ... |
2019-09-22 23:05:31 |
| 125.130.110.20 | attack | 2019-09-22T17:21:26.771829tmaserv sshd\[29205\]: Failed password for invalid user zhanglk from 125.130.110.20 port 56404 ssh2 2019-09-22T17:35:32.161600tmaserv sshd\[29799\]: Invalid user qwerty from 125.130.110.20 port 44156 2019-09-22T17:35:32.168559tmaserv sshd\[29799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 2019-09-22T17:35:34.806849tmaserv sshd\[29799\]: Failed password for invalid user qwerty from 125.130.110.20 port 44156 ssh2 2019-09-22T17:40:08.577001tmaserv sshd\[30058\]: Invalid user testsite from 125.130.110.20 port 40022 2019-09-22T17:40:08.583153tmaserv sshd\[30058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 ... |
2019-09-22 22:52:28 |
| 103.130.218.125 | attackspambots | 2019-09-22T17:21:50.000030tmaserv sshd\[29225\]: Invalid user mailtest from 103.130.218.125 port 36766 2019-09-22T17:21:50.006741tmaserv sshd\[29225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.218.125 2019-09-22T17:21:52.129629tmaserv sshd\[29225\]: Failed password for invalid user mailtest from 103.130.218.125 port 36766 ssh2 2019-09-22T17:28:44.736402tmaserv sshd\[29519\]: Invalid user mmk from 103.130.218.125 port 51364 2019-09-22T17:28:44.742499tmaserv sshd\[29519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.130.218.125 2019-09-22T17:28:46.699845tmaserv sshd\[29519\]: Failed password for invalid user mmk from 103.130.218.125 port 51364 ssh2 ... |
2019-09-22 22:42:40 |
| 92.207.166.44 | attack | 2019-09-19 09:14:28,786 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 92.207.166.44 2019-09-19 09:45:47,764 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 92.207.166.44 2019-09-19 10:15:57,849 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 92.207.166.44 2019-09-19 10:46:04,593 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 92.207.166.44 2019-09-19 11:16:35,311 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 92.207.166.44 ... |
2019-09-22 22:27:24 |
| 103.113.104.48 | attackspam | 3389BruteforceFW21 |
2019-09-22 22:57:03 |
| 115.159.59.203 | attackbots | Unauthorised access (Sep 22) SRC=115.159.59.203 LEN=40 TOS=0x10 PREC=0x40 TTL=236 ID=60672 TCP DPT=445 WINDOW=1024 SYN |
2019-09-22 22:29:41 |
| 106.13.48.241 | attackspam | Sep 21 21:43:45 datentool sshd[19334]: Invalid user testmail1 from 106.13.48.241 Sep 21 21:43:45 datentool sshd[19334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241 Sep 21 21:43:47 datentool sshd[19334]: Failed password for invalid user testmail1 from 106.13.48.241 port 49540 ssh2 Sep 21 21:55:25 datentool sshd[19371]: Invalid user jesse from 106.13.48.241 Sep 21 21:55:25 datentool sshd[19371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241 Sep 21 21:55:27 datentool sshd[19371]: Failed password for invalid user jesse from 106.13.48.241 port 43008 ssh2 Sep 21 22:00:08 datentool sshd[19415]: Invalid user operador from 106.13.48.241 Sep 21 22:00:08 datentool sshd[19415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241 Sep 21 22:00:10 datentool sshd[19415]: Failed password for invalid user operador from 106......... ------------------------------- |
2019-09-22 23:06:22 |
| 114.143.139.38 | attack | Sep 22 16:19:02 SilenceServices sshd[3864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38 Sep 22 16:19:04 SilenceServices sshd[3864]: Failed password for invalid user ccccc from 114.143.139.38 port 35808 ssh2 Sep 22 16:22:59 SilenceServices sshd[5281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38 |
2019-09-22 22:38:03 |
| 91.121.116.65 | attack | 2019-09-17 06:13:37,096 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 06:46:30,051 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 07:16:52,012 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 07:46:55,636 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 08:17:12,176 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 ... |
2019-09-22 22:39:35 |
| 180.248.56.153 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 13:45:23. |
2019-09-22 22:56:03 |
| 222.186.15.101 | attack | Sep 22 17:00:56 saschabauer sshd[14222]: Failed password for root from 222.186.15.101 port 49793 ssh2 |
2019-09-22 23:09:19 |
| 109.161.156.145 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 13:45:19. |
2019-09-22 23:04:35 |