城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.27.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.27.120. IN A
;; AUTHORITY SECTION:
. 439 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 09:12:05 CST 2022
;; MSG SIZE rcvd: 106
Host 120.27.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 120.27.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.254.132.239 | attackspambots | Sep 19 22:42:11 MK-Soft-Root1 sshd\[24408\]: Invalid user maint from 58.254.132.239 port 27034 Sep 19 22:42:11 MK-Soft-Root1 sshd\[24408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.239 Sep 19 22:42:14 MK-Soft-Root1 sshd\[24408\]: Failed password for invalid user maint from 58.254.132.239 port 27034 ssh2 ... |
2019-09-20 05:03:59 |
| 211.107.12.63 | attackspam | Sep 19 22:26:52 mail sshd\[32539\]: Invalid user edb from 211.107.12.63 port 45648 Sep 19 22:26:52 mail sshd\[32539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.12.63 Sep 19 22:26:53 mail sshd\[32539\]: Failed password for invalid user edb from 211.107.12.63 port 45648 ssh2 Sep 19 22:27:11 mail sshd\[32599\]: Invalid user deng from 211.107.12.63 port 46816 Sep 19 22:27:11 mail sshd\[32599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.12.63 |
2019-09-20 04:58:47 |
| 222.186.180.19 | attackbots | frenzy |
2019-09-20 05:02:06 |
| 62.234.62.191 | attack | Sep 19 22:34:23 vps691689 sshd[22218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.62.191 Sep 19 22:34:26 vps691689 sshd[22218]: Failed password for invalid user ftpuser from 62.234.62.191 port 60459 ssh2 ... |
2019-09-20 04:45:09 |
| 181.44.90.34 | attack | Sep 19 22:05:16 ns3110291 sshd\[2482\]: Invalid user shrieve from 181.44.90.34 Sep 19 22:05:16 ns3110291 sshd\[2482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.44.90.34 Sep 19 22:05:18 ns3110291 sshd\[2482\]: Failed password for invalid user shrieve from 181.44.90.34 port 33614 ssh2 Sep 19 22:10:32 ns3110291 sshd\[2682\]: Invalid user rogerio from 181.44.90.34 Sep 19 22:10:32 ns3110291 sshd\[2682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.44.90.34 ... |
2019-09-20 04:32:53 |
| 61.147.80.222 | attackspambots | Sep 19 20:34:19 MK-Soft-VM4 sshd\[20690\]: Invalid user student from 61.147.80.222 port 57718 Sep 19 20:34:19 MK-Soft-VM4 sshd\[20690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.147.80.222 Sep 19 20:34:21 MK-Soft-VM4 sshd\[20690\]: Failed password for invalid user student from 61.147.80.222 port 57718 ssh2 ... |
2019-09-20 04:35:18 |
| 95.191.131.13 | attackspambots | Sep 19 22:36:58 lnxmysql61 sshd[16184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.191.131.13 |
2019-09-20 04:52:57 |
| 74.141.132.233 | attackspambots | Sep 19 16:29:33 plusreed sshd[31921]: Invalid user ayanami from 74.141.132.233 ... |
2019-09-20 04:39:59 |
| 167.99.75.143 | attack | xmlrpc attack |
2019-09-20 04:52:19 |
| 114.32.218.156 | attackspambots | Sep 19 16:36:46 xtremcommunity sshd\[259194\]: Invalid user csgo4ever from 114.32.218.156 port 38048 Sep 19 16:36:46 xtremcommunity sshd\[259194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.218.156 Sep 19 16:36:49 xtremcommunity sshd\[259194\]: Failed password for invalid user csgo4ever from 114.32.218.156 port 38048 ssh2 Sep 19 16:41:00 xtremcommunity sshd\[259385\]: Invalid user maintain from 114.32.218.156 port 53960 Sep 19 16:41:00 xtremcommunity sshd\[259385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.218.156 ... |
2019-09-20 04:45:36 |
| 192.157.236.124 | attackspambots | Sep 19 10:15:40 lcdev sshd\[9098\]: Invalid user aj from 192.157.236.124 Sep 19 10:15:40 lcdev sshd\[9098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236-157-192.rdns.scalabledns.com Sep 19 10:15:42 lcdev sshd\[9098\]: Failed password for invalid user aj from 192.157.236.124 port 46654 ssh2 Sep 19 10:19:32 lcdev sshd\[9500\]: Invalid user catalin from 192.157.236.124 Sep 19 10:19:32 lcdev sshd\[9500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236-157-192.rdns.scalabledns.com |
2019-09-20 04:35:40 |
| 152.168.137.2 | attack | Sep 19 22:35:54 dev0-dcfr-rnet sshd[2387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2 Sep 19 22:35:56 dev0-dcfr-rnet sshd[2387]: Failed password for invalid user admin from 152.168.137.2 port 53674 ssh2 Sep 19 22:41:05 dev0-dcfr-rnet sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2 |
2019-09-20 04:42:32 |
| 222.188.75.204 | attack | SSH Bruteforce |
2019-09-20 04:42:12 |
| 190.96.49.189 | attackbotsspam | Sep 19 22:38:21 core sshd[14738]: Invalid user saurabh from 190.96.49.189 port 51172 Sep 19 22:38:23 core sshd[14738]: Failed password for invalid user saurabh from 190.96.49.189 port 51172 ssh2 ... |
2019-09-20 04:47:34 |
| 164.132.81.106 | attackbots | Sep 19 21:33:47 pornomens sshd\[10790\]: Invalid user test from 164.132.81.106 port 34806 Sep 19 21:33:47 pornomens sshd\[10790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106 Sep 19 21:33:49 pornomens sshd\[10790\]: Failed password for invalid user test from 164.132.81.106 port 34806 ssh2 ... |
2019-09-20 05:05:25 |