城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.45.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.45.191. IN A
;; AUTHORITY SECTION:
. 98 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:31:20 CST 2022
;; MSG SIZE rcvd: 106
Host 191.45.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 191.45.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 119.29.197.54 | attackbots | Jan 8 13:17:58 *** sshd[23402]: Invalid user ftpuser from 119.29.197.54 |
2020-01-08 22:45:18 |
| 112.85.42.182 | attackbots | SSH Bruteforce attempt |
2020-01-08 23:25:26 |
| 202.107.238.14 | attackbots | leo_www |
2020-01-08 22:41:59 |
| 207.107.67.67 | attackbots | frenzy |
2020-01-08 22:53:43 |
| 129.28.30.54 | attackbotsspam | Jan 8 19:36:37 gw1 sshd[16199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.30.54 Jan 8 19:36:39 gw1 sshd[16199]: Failed password for invalid user ptk from 129.28.30.54 port 35668 ssh2 ... |
2020-01-08 23:00:12 |
| 102.176.246.225 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-08 23:23:29 |
| 94.23.50.194 | attack | " " |
2020-01-08 23:10:13 |
| 200.29.100.5 | attack | Jan 8 14:03:59 nextcloud sshd\[21617\]: Invalid user ojj from 200.29.100.5 Jan 8 14:03:59 nextcloud sshd\[21617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.100.5 Jan 8 14:04:01 nextcloud sshd\[21617\]: Failed password for invalid user ojj from 200.29.100.5 port 45020 ssh2 ... |
2020-01-08 23:20:42 |
| 112.85.42.176 | attack | Jan 8 15:45:46 *host* sshd\[31602\]: Unable to negotiate with 112.85.42.176 port 8166: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ... |
2020-01-08 22:50:50 |
| 222.186.173.142 | attackspam | Jan 8 15:38:39 amit sshd\[5130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root Jan 8 15:38:41 amit sshd\[5130\]: Failed password for root from 222.186.173.142 port 57856 ssh2 Jan 8 15:39:01 amit sshd\[5132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root ... |
2020-01-08 22:41:40 |
| 181.48.139.118 | attackspam | Jan 8 14:03:49 [snip] sshd[8291]: Invalid user ec2-user from 181.48.139.118 port 51078 Jan 8 14:03:49 [snip] sshd[8291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.139.118 Jan 8 14:03:50 [snip] sshd[8291]: Failed password for invalid user ec2-user from 181.48.139.118 port 51078 ssh2[...] |
2020-01-08 23:29:18 |
| 222.186.175.181 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181 user=root Failed password for root from 222.186.175.181 port 25511 ssh2 Failed password for root from 222.186.175.181 port 25511 ssh2 Failed password for root from 222.186.175.181 port 25511 ssh2 Failed password for root from 222.186.175.181 port 25511 ssh2 |
2020-01-08 23:32:27 |
| 206.189.149.9 | attack | Jan 8 15:33:24 plex sshd[31492]: Invalid user mating from 206.189.149.9 port 36304 |
2020-01-08 23:17:18 |
| 186.249.13.146 | attackspambots | Unauthorized connection attempt detected from IP address 186.249.13.146 to port 445 |
2020-01-08 23:30:34 |
| 45.141.86.118 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.141.86.118 to port 3390 [T] |
2020-01-08 22:47:17 |