城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.73.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.73.219. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:52:09 CST 2022
;; MSG SIZE rcvd: 106
Host 219.73.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 219.73.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.85.42.173 | attackbots | Jul 9 11:13:23 jane sshd[14608]: Failed password for root from 112.85.42.173 port 35303 ssh2 Jul 9 11:13:28 jane sshd[14608]: Failed password for root from 112.85.42.173 port 35303 ssh2 ... |
2020-07-09 17:16:24 |
| 190.54.22.66 | attackbotsspam | Port Scan detected! ... |
2020-07-09 17:03:26 |
| 122.51.238.211 | attack | Jul 9 11:08:59 server sshd[26261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.238.211 Jul 9 11:09:01 server sshd[26261]: Failed password for invalid user qqm from 122.51.238.211 port 33668 ssh2 Jul 9 11:13:43 server sshd[26807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.238.211 Jul 9 11:13:46 server sshd[26807]: Failed password for invalid user ranjeet from 122.51.238.211 port 49708 ssh2 |
2020-07-09 17:24:23 |
| 196.202.58.100 | attackspambots | Automatic report - Port Scan Attack |
2020-07-09 17:05:44 |
| 54.37.14.3 | attackbotsspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-07-09 17:19:06 |
| 77.29.7.234 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-09 17:20:08 |
| 171.235.185.203 | attackbotsspam | Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn. |
2020-07-09 17:10:44 |
| 212.102.33.207 | attack | (From vitalija.moris@gmail.com) Hi there, We offer personal protective equipment to all our society, businesses and organizations that are need in of protective items. We would like to efficiently help delivering you with the highest quality of personal protection products in the shortest time. We have the below stock available and can ship them out to you right away. - Different face masks - Face mask for children - Nitrile, latex and vinyl gloves - Thermometers - Disinfection sprays, hand sanitizer gels and antibacterial wipes - Goggles - Face shields Here you can place your order online: https://bit.ly/meeedesignservices-ppe Please feel free to reach out to me at the below contact info: Fate Oliyaei Fate@meeedesignservices.com Fate.oliyaei@gmail.com Phone: (415) 795-2880 |
2020-07-09 17:12:08 |
| 83.239.138.38 | attackbotsspam | 2020-07-09T07:46:47.971500abusebot-7.cloudsearch.cf sshd[7732]: Invalid user sounds from 83.239.138.38 port 37964 2020-07-09T07:46:47.978567abusebot-7.cloudsearch.cf sshd[7732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.239.138.38 2020-07-09T07:46:47.971500abusebot-7.cloudsearch.cf sshd[7732]: Invalid user sounds from 83.239.138.38 port 37964 2020-07-09T07:46:50.048868abusebot-7.cloudsearch.cf sshd[7732]: Failed password for invalid user sounds from 83.239.138.38 port 37964 ssh2 2020-07-09T07:51:34.631376abusebot-7.cloudsearch.cf sshd[7738]: Invalid user yolly from 83.239.138.38 port 44177 2020-07-09T07:51:34.636484abusebot-7.cloudsearch.cf sshd[7738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.239.138.38 2020-07-09T07:51:34.631376abusebot-7.cloudsearch.cf sshd[7738]: Invalid user yolly from 83.239.138.38 port 44177 2020-07-09T07:51:36.439566abusebot-7.cloudsearch.cf sshd[7738]: Failed pass ... |
2020-07-09 17:34:35 |
| 106.12.122.138 | attackspam | Failed password for invalid user prometheus from 106.12.122.138 port 44150 ssh2 |
2020-07-09 17:32:39 |
| 106.12.196.118 | attack | Jul 9 11:31:47 PorscheCustomer sshd[27396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.196.118 Jul 9 11:31:50 PorscheCustomer sshd[27396]: Failed password for invalid user gmodserver from 106.12.196.118 port 59818 ssh2 Jul 9 11:34:44 PorscheCustomer sshd[27433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.196.118 ... |
2020-07-09 17:41:32 |
| 106.13.167.94 | attackspam | Jul 9 02:16:15 Tower sshd[24312]: Connection from 106.13.167.94 port 39116 on 192.168.10.220 port 22 rdomain "" Jul 9 02:16:17 Tower sshd[24312]: Invalid user deamon from 106.13.167.94 port 39116 Jul 9 02:16:17 Tower sshd[24312]: error: Could not get shadow information for NOUSER Jul 9 02:16:17 Tower sshd[24312]: Failed password for invalid user deamon from 106.13.167.94 port 39116 ssh2 Jul 9 02:16:17 Tower sshd[24312]: Received disconnect from 106.13.167.94 port 39116:11: Bye Bye [preauth] Jul 9 02:16:17 Tower sshd[24312]: Disconnected from invalid user deamon 106.13.167.94 port 39116 [preauth] |
2020-07-09 17:39:30 |
| 51.178.142.220 | attackbotsspam | Jul 9 16:55:23 NG-HHDC-SVS-001 sshd[23496]: Invalid user rodrigo from 51.178.142.220 ... |
2020-07-09 17:14:18 |
| 49.88.112.77 | attack | Jul 9 12:15:12 pkdns2 sshd\[6445\]: Failed password for root from 49.88.112.77 port 57770 ssh2Jul 9 12:19:00 pkdns2 sshd\[6578\]: Failed password for root from 49.88.112.77 port 61225 ssh2Jul 9 12:19:02 pkdns2 sshd\[6578\]: Failed password for root from 49.88.112.77 port 61225 ssh2Jul 9 12:19:05 pkdns2 sshd\[6578\]: Failed password for root from 49.88.112.77 port 61225 ssh2Jul 9 12:20:35 pkdns2 sshd\[6693\]: Failed password for root from 49.88.112.77 port 49582 ssh2Jul 9 12:23:37 pkdns2 sshd\[6838\]: Failed password for root from 49.88.112.77 port 22128 ssh2 ... |
2020-07-09 17:31:24 |
| 35.204.80.82 | attackspam | xmlrpc attack |
2020-07-09 17:09:15 |