城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.28.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.28.27. IN A
;; AUTHORITY SECTION:
. 273 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:21:37 CST 2022
;; MSG SIZE rcvd: 105
Host 27.28.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 27.28.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 72.38.192.163 | attack | " " |
2020-05-13 13:08:31 |
| 94.102.51.78 | attackbotsspam | $lgm |
2020-05-13 12:56:55 |
| 193.112.1.26 | attackspam | May 13 09:22:05 gw1 sshd[17664]: Failed password for ubuntu from 193.112.1.26 port 38010 ssh2 ... |
2020-05-13 12:48:59 |
| 222.186.173.180 | attackspam | 2020-05-13T05:23:22.692063abusebot-2.cloudsearch.cf sshd[1156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root 2020-05-13T05:23:24.845382abusebot-2.cloudsearch.cf sshd[1156]: Failed password for root from 222.186.173.180 port 21960 ssh2 2020-05-13T05:23:28.110502abusebot-2.cloudsearch.cf sshd[1156]: Failed password for root from 222.186.173.180 port 21960 ssh2 2020-05-13T05:23:22.692063abusebot-2.cloudsearch.cf sshd[1156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root 2020-05-13T05:23:24.845382abusebot-2.cloudsearch.cf sshd[1156]: Failed password for root from 222.186.173.180 port 21960 ssh2 2020-05-13T05:23:28.110502abusebot-2.cloudsearch.cf sshd[1156]: Failed password for root from 222.186.173.180 port 21960 ssh2 2020-05-13T05:23:22.692063abusebot-2.cloudsearch.cf sshd[1156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ... |
2020-05-13 13:24:56 |
| 5.196.8.72 | attack | May 12 19:03:08 wbs sshd\[20951\]: Invalid user server from 5.196.8.72 May 12 19:03:08 wbs sshd\[20951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.ip-5-196-8.eu May 12 19:03:10 wbs sshd\[20951\]: Failed password for invalid user server from 5.196.8.72 port 39026 ssh2 May 12 19:06:32 wbs sshd\[21278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.ip-5-196-8.eu user=root May 12 19:06:34 wbs sshd\[21278\]: Failed password for root from 5.196.8.72 port 43848 ssh2 |
2020-05-13 13:21:25 |
| 14.185.134.222 | attackspam | May 13 05:58:32 vpn01 sshd[17176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.185.134.222 May 13 05:58:34 vpn01 sshd[17176]: Failed password for invalid user nagesh from 14.185.134.222 port 64009 ssh2 ... |
2020-05-13 13:21:11 |
| 24.51.72.227 | attackspambots | Mail sent to address obtained from MySpace hack |
2020-05-13 13:41:49 |
| 140.143.160.217 | attackbots | May 13 00:58:42 ws24vmsma01 sshd[243448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.160.217 May 13 00:58:43 ws24vmsma01 sshd[243448]: Failed password for invalid user user from 140.143.160.217 port 37768 ssh2 ... |
2020-05-13 13:12:13 |
| 62.234.2.59 | attackbots | May 13 05:08:08 game-panel sshd[27796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.2.59 May 13 05:08:11 game-panel sshd[27796]: Failed password for invalid user ubuntu from 62.234.2.59 port 40278 ssh2 May 13 05:12:52 game-panel sshd[28133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.2.59 |
2020-05-13 13:28:53 |
| 128.199.171.81 | attackspam | May 12 19:06:41 hanapaa sshd\[4078\]: Invalid user virl from 128.199.171.81 May 12 19:06:41 hanapaa sshd\[4078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.171.81 May 12 19:06:43 hanapaa sshd\[4078\]: Failed password for invalid user virl from 128.199.171.81 port 12134 ssh2 May 12 19:11:01 hanapaa sshd\[4462\]: Invalid user agencia from 128.199.171.81 May 12 19:11:01 hanapaa sshd\[4462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.171.81 |
2020-05-13 13:20:33 |
| 103.145.12.87 | attackspam | [2020-05-13 00:59:20] NOTICE[1157][C-00004119] chan_sip.c: Call from '' (103.145.12.87:57944) to extension '9011441482455983' rejected because extension not found in context 'public'. [2020-05-13 00:59:20] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-13T00:59:20.057-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441482455983",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.87/57944",ACLName="no_extension_match" [2020-05-13 00:59:21] NOTICE[1157][C-0000411a] chan_sip.c: Call from '' (103.145.12.87:51624) to extension '901146812400368' rejected because extension not found in context 'public'. [2020-05-13 00:59:21] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-13T00:59:21.867-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146812400368",SessionID="0x7f5f107b3898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD ... |
2020-05-13 13:09:19 |
| 122.154.66.170 | attackspam | Unauthorised access (May 13) SRC=122.154.66.170 LEN=52 PREC=0x20 TTL=114 ID=23368 TCP DPT=445 WINDOW=8192 SYN |
2020-05-13 13:24:07 |
| 67.70.142.247 | attackspambots | 2020-05-12T23:33:48.8959901495-001 sshd[6098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shbkpq4068w-lp130-01-67-70-142-247.dsl.bell.ca 2020-05-12T23:33:48.8928321495-001 sshd[6098]: Invalid user teampspeak3 from 67.70.142.247 port 40906 2020-05-12T23:33:50.8895521495-001 sshd[6098]: Failed password for invalid user teampspeak3 from 67.70.142.247 port 40906 ssh2 2020-05-12T23:37:22.0719071495-001 sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shbkpq4068w-lp130-01-67-70-142-247.dsl.bell.ca user=root 2020-05-12T23:37:23.7749691495-001 sshd[6260]: Failed password for root from 67.70.142.247 port 44826 ssh2 2020-05-12T23:40:55.1990241495-001 sshd[6381]: Invalid user xr from 67.70.142.247 port 48750 ... |
2020-05-13 13:11:50 |
| 103.145.13.19 | attackbotsspam | [MK-VM6] Blocked by UFW |
2020-05-13 13:08:57 |
| 13.66.6.105 | attack | sae-12 : Block return, carriage return, ... characters=>/?view=category'A=0&id=60(') |
2020-05-13 13:09:36 |