城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.73.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.73.129. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:51:42 CST 2022
;; MSG SIZE rcvd: 106
Host 129.73.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 129.73.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 2.238.193.59 | attack | Invalid user morris from 2.238.193.59 port 45320 |
2019-10-26 18:01:47 |
| 119.109.251.145 | attackbots | SMTP-sasl brute force ... |
2019-10-26 18:00:40 |
| 60.220.39.110 | attack | Unauthorised access (Oct 26) SRC=60.220.39.110 LEN=40 TTL=49 ID=36734 TCP DPT=8080 WINDOW=9164 SYN |
2019-10-26 18:12:42 |
| 211.35.76.241 | attackspam | Invalid user niang from 211.35.76.241 port 44633 |
2019-10-26 18:09:57 |
| 162.210.196.130 | attack | Automatic report - Banned IP Access |
2019-10-26 18:02:08 |
| 37.59.98.64 | attackbots | Oct 26 09:10:29 DAAP sshd[24175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.98.64 user=root Oct 26 09:10:31 DAAP sshd[24175]: Failed password for root from 37.59.98.64 port 51164 ssh2 Oct 26 09:15:34 DAAP sshd[24193]: Invalid user sugar from 37.59.98.64 port 41962 Oct 26 09:15:34 DAAP sshd[24193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.98.64 Oct 26 09:15:34 DAAP sshd[24193]: Invalid user sugar from 37.59.98.64 port 41962 Oct 26 09:15:36 DAAP sshd[24193]: Failed password for invalid user sugar from 37.59.98.64 port 41962 ssh2 ... |
2019-10-26 18:13:22 |
| 139.159.27.62 | attackspam | Oct 26 06:45:56 hosting sshd[28643]: Invalid user 123456 from 139.159.27.62 port 56342 ... |
2019-10-26 18:04:15 |
| 112.85.42.186 | attackspam | Oct 26 11:40:16 ns381471 sshd[25905]: Failed password for root from 112.85.42.186 port 42170 ssh2 |
2019-10-26 17:51:31 |
| 142.44.160.214 | attack | Oct 26 05:07:17 localhost sshd[27730]: Invalid user phoenix1 from 142.44.160.214 port 55535 Oct 26 05:07:17 localhost sshd[27730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214 Oct 26 05:07:17 localhost sshd[27730]: Invalid user phoenix1 from 142.44.160.214 port 55535 Oct 26 05:07:19 localhost sshd[27730]: Failed password for invalid user phoenix1 from 142.44.160.214 port 55535 ssh2 Oct 26 05:11:38 localhost sshd[27781]: Invalid user norman from 142.44.160.214 port 46207 |
2019-10-26 17:50:22 |
| 149.129.251.152 | attackspambots | 2019-10-26T05:56:16.979617hub.schaetter.us sshd\[3782\]: Invalid user nokia5800 from 149.129.251.152 port 51578 2019-10-26T05:56:16.987174hub.schaetter.us sshd\[3782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.251.152 2019-10-26T05:56:18.764062hub.schaetter.us sshd\[3782\]: Failed password for invalid user nokia5800 from 149.129.251.152 port 51578 ssh2 2019-10-26T06:01:00.272747hub.schaetter.us sshd\[3812\]: Invalid user AB12345 from 149.129.251.152 port 33278 2019-10-26T06:01:00.280486hub.schaetter.us sshd\[3812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.251.152 ... |
2019-10-26 17:55:30 |
| 139.59.141.196 | attackbots | Automatic report - Banned IP Access |
2019-10-26 18:10:43 |
| 185.100.87.41 | attackspam | Oct 24 08:48:39 rama sshd[232313]: Invalid user ceo from 185.100.87.41 Oct 24 08:48:39 rama sshd[232313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.41 Oct 24 08:48:41 rama sshd[232313]: Failed password for invalid user ceo from 185.100.87.41 port 42363 ssh2 Oct 24 08:48:42 rama sshd[232313]: Connection closed by 185.100.87.41 [preauth] Oct 24 11:13:50 rama sshd[302113]: Invalid user miusuario from 185.100.87.41 Oct 24 11:13:50 rama sshd[302113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.41 Oct 24 11:13:51 rama sshd[302113]: Failed password for invalid user miusuario from 185.100.87.41 port 41452 ssh2 Oct 24 11:13:52 rama sshd[302113]: Connection closed by 185.100.87.41 [preauth] Oct 24 11:13:56 rama sshd[302132]: Invalid user mobile from 185.100.87.41 Oct 24 11:13:56 rama sshd[302132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=........ ------------------------------- |
2019-10-26 17:58:05 |
| 52.192.157.75 | attack | slow and persistent scanner |
2019-10-26 17:39:10 |
| 188.166.228.244 | attackbots | SSH Bruteforce |
2019-10-26 18:08:39 |
| 185.173.35.37 | attackbots | Honeypot attack, port: 139, PTR: 185.173.35.37.netsystemsresearch.com. |
2019-10-26 18:19:29 |