城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.31.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.31.80. IN A
;; AUTHORITY SECTION:
. 291 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 09:33:10 CST 2022
;; MSG SIZE rcvd: 105
Host 80.31.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 80.31.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 194.182.65.169 | attackbotsspam | Sep 21 05:56:24 ms-srv sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.65.169 Sep 21 05:56:26 ms-srv sshd[17702]: Failed password for invalid user nagios from 194.182.65.169 port 47766 ssh2 |
2020-02-03 02:49:53 |
| 112.85.42.188 | attack | 02/02/2020-13:12:04.860305 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-02-03 02:12:53 |
| 194.36.190.154 | attackbots | Dec 30 14:26:48 ms-srv sshd[19597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.190.154 Dec 30 14:26:50 ms-srv sshd[19597]: Failed password for invalid user lapeere from 194.36.190.154 port 49120 ssh2 |
2020-02-03 02:22:28 |
| 194.36.174.15 | attackspambots | Aug 29 15:56:11 ms-srv sshd[7784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.174.15 user=games Aug 29 15:56:13 ms-srv sshd[7784]: Failed password for invalid user games from 194.36.174.15 port 52746 ssh2 |
2020-02-03 02:24:03 |
| 194.208.135.39 | attackspambots | Jan 12 15:18:37 ms-srv sshd[17547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.208.135.39 Jan 12 15:18:38 ms-srv sshd[17547]: Failed password for invalid user pk from 194.208.135.39 port 32930 ssh2 |
2020-02-03 02:38:09 |
| 194.56.72.8 | attackspambots | Dec 10 08:56:14 ms-srv sshd[24329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.56.72.8 Dec 10 08:56:15 ms-srv sshd[24329]: Failed password for invalid user powerapp from 194.56.72.8 port 51226 ssh2 |
2020-02-03 02:09:08 |
| 89.152.255.213 | attackspam | Unauthorized connection attempt detected from IP address 89.152.255.213 to port 23 [J] |
2020-02-03 02:22:07 |
| 14.252.190.248 | attackspam | DATE:2020-02-02 16:08:14, IP:14.252.190.248, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-02-03 02:27:21 |
| 125.69.160.97 | attack | DATE:2020-02-02 16:08:08, IP:125.69.160.97, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-02-03 02:41:13 |
| 154.70.247.106 | attackspam | DATE:2020-02-02 16:08:18, IP:154.70.247.106, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-02-03 02:18:36 |
| 194.44.246.130 | attackspam | Dec 10 00:24:44 ms-srv sshd[59997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.44.246.130 Dec 10 00:24:46 ms-srv sshd[59997]: Failed password for invalid user http from 194.44.246.130 port 58094 ssh2 |
2020-02-03 02:15:54 |
| 176.109.232.252 | attackbots | " " |
2020-02-03 02:09:38 |
| 194.24.228.93 | attack | Jan 23 20:46:46 ms-srv sshd[42070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.24.228.93 Jan 23 20:46:48 ms-srv sshd[42070]: Failed password for invalid user butter from 194.24.228.93 port 45666 ssh2 |
2020-02-03 02:29:06 |
| 194.182.84.105 | attackbotsspam | Sep 11 23:18:04 ms-srv sshd[56230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.84.105 Sep 11 23:18:07 ms-srv sshd[56230]: Failed password for invalid user test from 194.182.84.105 port 53448 ssh2 |
2020-02-03 02:43:32 |
| 168.227.17.232 | attack | DATE:2020-02-02 16:08:21, IP:168.227.17.232, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-02-03 02:11:43 |