城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.40.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42524
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.40.231. IN A
;; AUTHORITY SECTION:
. 157 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:28:43 CST 2022
;; MSG SIZE rcvd: 106
Host 231.40.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 231.40.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.82.65.213 | attack | " " |
2019-08-27 07:11:43 |
| 139.59.59.187 | attack | SSH-BruteForce |
2019-08-27 06:43:47 |
| 120.52.121.86 | attackbotsspam | Aug 27 00:22:06 ubuntu-2gb-nbg1-dc3-1 sshd[28856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86 Aug 27 00:22:08 ubuntu-2gb-nbg1-dc3-1 sshd[28856]: Failed password for invalid user myworkingcrack from 120.52.121.86 port 56677 ssh2 ... |
2019-08-27 07:14:20 |
| 123.21.157.137 | attackbots | Lines containing failures of 123.21.157.137 Aug 26 12:37:39 hal postfix/smtpd[17894]: connect from unknown[123.21.157.137] Aug 26 12:37:51 hal postfix/policy-spf[21425]: Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=c.narducci%40intecvr.hostname;ip=123.21.157.137;r=hal.godelia.org Aug x@x Aug 26 12:37:56 hal postfix/smtpd[17894]: lost connection after DATA from unknown[123.21.157.137] Aug 26 12:37:56 hal postfix/smtpd[17894]: disconnect from unknown[123.21.157.137] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4 Aug 26 12:38:25 hal postfix/smtpd[17894]: connect from unknown[123.21.157.137] Aug 26 12:38:28 hal postfix/policy-spf[21425]: Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=c.narducci%40intecvr.hostname;ip=123.21.157.137;r=hal.godelia.org Aug x@x Aug 26 12:38:31 hal postfix/smtpd[17894]: lost connection after DATA from unknown[123.21.157.137] Aug 26 12:38:31 hal postfix/smtpd[17894]: disconnect from unknown[123.21.157.137] eh........ ------------------------------ |
2019-08-27 06:33:02 |
| 104.131.15.189 | attackspam | Aug 26 04:01:08 tdfoods sshd\[1885\]: Invalid user test from 104.131.15.189 Aug 26 04:01:08 tdfoods sshd\[1885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gcore.io Aug 26 04:01:10 tdfoods sshd\[1885\]: Failed password for invalid user test from 104.131.15.189 port 35925 ssh2 Aug 26 04:05:54 tdfoods sshd\[2302\]: Invalid user bmuuser from 104.131.15.189 Aug 26 04:05:54 tdfoods sshd\[2302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gcore.io |
2019-08-27 07:02:38 |
| 139.59.4.141 | attackbots | fraudulent SSH attempt |
2019-08-27 06:53:03 |
| 54.37.234.66 | attackbotsspam | Aug 27 00:41:38 host sshd\[41270\]: Failed password for sshd from 54.37.234.66 port 49718 ssh2 Aug 27 00:41:40 host sshd\[41270\]: Failed password for sshd from 54.37.234.66 port 49718 ssh2 ... |
2019-08-27 06:46:54 |
| 142.93.108.189 | attackbotsspam | xmlrpc attack |
2019-08-27 07:06:01 |
| 165.227.179.138 | attack | Aug 26 22:56:42 hb sshd\[18234\]: Invalid user mella from 165.227.179.138 Aug 26 22:56:42 hb sshd\[18234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.179.138 Aug 26 22:56:43 hb sshd\[18234\]: Failed password for invalid user mella from 165.227.179.138 port 43646 ssh2 Aug 26 23:00:38 hb sshd\[18622\]: Invalid user chi from 165.227.179.138 Aug 26 23:00:38 hb sshd\[18622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.179.138 |
2019-08-27 07:04:08 |
| 103.229.85.27 | attackbots | Aug 26 22:29:38 our-server-hostname postfix/smtpd[8706]: connect from unknown[103.229.85.27] Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.229.85.27 |
2019-08-27 07:15:22 |
| 119.178.175.73 | attackbotsspam | Aug 26 12:25:48 linuxrulz sshd[7768]: Invalid user 111 from 119.178.175.73 port 59454 Aug 26 12:25:48 linuxrulz sshd[7768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.178.175.73 Aug 26 12:25:50 linuxrulz sshd[7768]: Failed password for invalid user 111 from 119.178.175.73 port 59454 ssh2 Aug 26 12:25:51 linuxrulz sshd[7768]: Received disconnect from 119.178.175.73 port 59454:11: Bye Bye [preauth] Aug 26 12:25:51 linuxrulz sshd[7768]: Disconnected from 119.178.175.73 port 59454 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=119.178.175.73 |
2019-08-27 06:52:42 |
| 103.40.235.233 | attack | F2B jail: sshd. Time: 2019-08-26 17:55:47, Reported by: VKReport |
2019-08-27 06:54:39 |
| 61.154.64.102 | attackspam | Aug 26 17:49:54 localhost postfix/smtpd\[23221\]: warning: unknown\[61.154.64.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 26 17:50:04 localhost postfix/smtpd\[23328\]: warning: unknown\[61.154.64.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 26 17:50:16 localhost postfix/smtpd\[23217\]: warning: unknown\[61.154.64.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 26 17:50:49 localhost postfix/smtpd\[23329\]: warning: unknown\[61.154.64.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 26 17:51:00 localhost postfix/smtpd\[23329\]: warning: unknown\[61.154.64.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-08-27 07:13:25 |
| 219.140.163.100 | attack | Aug 26 07:37:14 zn007 sshd[12944]: Invalid user testwww from 219.140.163.100 Aug 26 07:37:14 zn007 sshd[12944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.163.100 Aug 26 07:37:17 zn007 sshd[12944]: Failed password for invalid user testwww from 219.140.163.100 port 2158 ssh2 Aug 26 07:37:17 zn007 sshd[12944]: Received disconnect from 219.140.163.100: 11: Bye Bye [preauth] Aug 26 07:58:24 zn007 sshd[15414]: Invalid user maja from 219.140.163.100 Aug 26 07:58:24 zn007 sshd[15414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.163.100 Aug 26 07:58:26 zn007 sshd[15414]: Failed password for invalid user maja from 219.140.163.100 port 2160 ssh2 Aug 26 07:58:26 zn007 sshd[15414]: Received disconnect from 219.140.163.100: 11: Bye Bye [preauth] Aug 26 08:02:27 zn007 sshd[16168]: Invalid user vnptco from 219.140.163.100 Aug 26 08:02:27 zn007 sshd[16168]: pam_unix(sshd:auth): au........ ------------------------------- |
2019-08-27 06:56:10 |
| 222.186.15.101 | attackbots | SSH Brute Force, server-1 sshd[8748]: Failed password for root from 222.186.15.101 port 40662 ssh2 |
2019-08-27 06:58:01 |