城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.72.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.72.140. IN A
;; AUTHORITY SECTION:
. 418 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:50:32 CST 2022
;; MSG SIZE rcvd: 106
Host 140.72.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 140.72.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 161.189.62.162 | attackbots | Aug 18 22:55:55 s158375 sshd[8351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.189.62.162 |
2020-08-19 12:44:43 |
| 221.144.178.231 | attackbots | SSH |
2020-08-19 12:27:05 |
| 159.253.31.115 | attackspam | 159.253.31.115 - - [19/Aug/2020:05:56:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.253.31.115 - - [19/Aug/2020:05:56:04 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.253.31.115 - - [19/Aug/2020:05:56:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.253.31.115 - - [19/Aug/2020:05:56:04 +0200] "POST /wp-login.php HTTP/1.1" 200 2030 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.253.31.115 - - [19/Aug/2020:05:56:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.253.31.115 - - [19/Aug/2020:05:56:04 +0200] "POST /wp-login.php HTTP/1.1" 200 2030 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001 ... |
2020-08-19 12:34:09 |
| 193.169.253.136 | attackbots | 2020-08-19 06:17:12 auth_plain authenticator failed for (gameplay-club.com.ua) [193.169.253.136]: 535 Incorrect authentication data (set_id=sales@gameplay-club.com.ua) 2020-08-19 06:56:19 auth_plain authenticator failed for (gameplay-club.com.ua) [193.169.253.136]: 535 Incorrect authentication data (set_id=sales@gameplay-club.com.ua) ... |
2020-08-19 12:19:45 |
| 162.247.74.200 | attackspam | sshd |
2020-08-19 12:07:15 |
| 129.204.232.224 | attack | Aug 19 00:55:10 firewall sshd[19217]: Invalid user rgp from 129.204.232.224 Aug 19 00:55:12 firewall sshd[19217]: Failed password for invalid user rgp from 129.204.232.224 port 47958 ssh2 Aug 19 00:56:21 firewall sshd[19262]: Invalid user man1 from 129.204.232.224 ... |
2020-08-19 12:18:49 |
| 14.173.17.46 | attackspambots | 1597809380 - 08/19/2020 05:56:20 Host: 14.173.17.46/14.173.17.46 Port: 445 TCP Blocked |
2020-08-19 12:20:53 |
| 45.95.168.96 | attackspambots | 2020-08-18T22:28:14.263736linuxbox-skyline auth[165999]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=no-reply rhost=45.95.168.96 ... |
2020-08-19 12:31:25 |
| 73.190.128.201 | attackspam | Unauthorised access (Aug 19) SRC=73.190.128.201 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=52271 TCP DPT=8080 WINDOW=7887 SYN Unauthorised access (Aug 18) SRC=73.190.128.201 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=10432 TCP DPT=8080 WINDOW=7887 SYN |
2020-08-19 12:35:26 |
| 51.75.241.233 | attackbots | Aug 19 06:07:36 ip106 sshd[31174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.241.233 Aug 19 06:07:38 ip106 sshd[31174]: Failed password for invalid user administrator from 51.75.241.233 port 48172 ssh2 ... |
2020-08-19 12:15:04 |
| 87.117.63.12 | attackspam | https://6x.writingservice24x7.com/en/csula-library-thesis-60243.html Medical resume writing services. -- Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36 OPR/54.0.2952.64 |
2020-08-19 12:38:15 |
| 5.62.20.48 | attack | 0,55-02/03 [bc01/m63] PostRequest-Spammer scoring: essen |
2020-08-19 12:19:15 |
| 148.72.212.161 | attackbotsspam | 2020-08-19T04:35:50.846930shield sshd\[26597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-212-161.ip.secureserver.net user=root 2020-08-19T04:35:53.567762shield sshd\[26597\]: Failed password for root from 148.72.212.161 port 48590 ssh2 2020-08-19T04:39:19.917337shield sshd\[26815\]: Invalid user admin from 148.72.212.161 port 39998 2020-08-19T04:39:19.928192shield sshd\[26815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-212-161.ip.secureserver.net 2020-08-19T04:39:21.672839shield sshd\[26815\]: Failed password for invalid user admin from 148.72.212.161 port 39998 ssh2 |
2020-08-19 12:39:35 |
| 59.124.90.112 | attackbots | fail2ban/Aug 19 05:52:24 h1962932 sshd[6883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-124-90-112.hinet-ip.hinet.net user=root Aug 19 05:52:26 h1962932 sshd[6883]: Failed password for root from 59.124.90.112 port 39015 ssh2 Aug 19 05:56:35 h1962932 sshd[7010]: Invalid user goga from 59.124.90.112 port 43163 Aug 19 05:56:35 h1962932 sshd[7010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-124-90-112.hinet-ip.hinet.net Aug 19 05:56:35 h1962932 sshd[7010]: Invalid user goga from 59.124.90.112 port 43163 Aug 19 05:56:36 h1962932 sshd[7010]: Failed password for invalid user goga from 59.124.90.112 port 43163 ssh2 |
2020-08-19 12:08:29 |
| 58.56.164.66 | attack | Aug 19 04:56:31 ajax sshd[13497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.164.66 Aug 19 04:56:33 ajax sshd[13497]: Failed password for invalid user bmf from 58.56.164.66 port 35370 ssh2 |
2020-08-19 12:12:17 |