城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.74.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.74.47. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:53:29 CST 2022
;; MSG SIZE rcvd: 105
Host 47.74.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 47.74.21.104.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
91.216.133.165 | attack | Sep 23 19:09:18 ssh2 sshd[72271]: Invalid user admin from 91.216.133.165 port 61015 Sep 23 19:09:19 ssh2 sshd[72271]: Failed password for invalid user admin from 91.216.133.165 port 61015 ssh2 Sep 23 19:09:19 ssh2 sshd[72271]: Connection closed by invalid user admin 91.216.133.165 port 61015 [preauth] ... |
2020-09-24 20:14:08 |
152.32.166.14 | attackbotsspam | Sep 24 16:41:49 gw1 sshd[26185]: Failed password for root from 152.32.166.14 port 46448 ssh2 ... |
2020-09-24 20:08:07 |
78.128.113.121 | attackbotsspam | Sep 24 13:17:06 mail.srvfarm.net postfix/smtpd[776029]: warning: unknown[78.128.113.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 24 13:17:06 mail.srvfarm.net postfix/smtpd[776029]: lost connection after AUTH from unknown[78.128.113.121] Sep 24 13:17:10 mail.srvfarm.net postfix/smtpd[788636]: lost connection after AUTH from unknown[78.128.113.121] Sep 24 13:17:15 mail.srvfarm.net postfix/smtpd[788639]: lost connection after AUTH from unknown[78.128.113.121] Sep 24 13:17:20 mail.srvfarm.net postfix/smtpd[791680]: lost connection after AUTH from unknown[78.128.113.121] |
2020-09-24 20:06:20 |
59.125.145.88 | attackbots | Sep 24 11:11:41 abendstille sshd\[5070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.145.88 user=root Sep 24 11:11:43 abendstille sshd\[5070\]: Failed password for root from 59.125.145.88 port 63845 ssh2 Sep 24 11:16:01 abendstille sshd\[8768\]: Invalid user deploy from 59.125.145.88 Sep 24 11:16:01 abendstille sshd\[8768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.145.88 Sep 24 11:16:04 abendstille sshd\[8768\]: Failed password for invalid user deploy from 59.125.145.88 port 17623 ssh2 ... |
2020-09-24 19:43:20 |
45.158.199.156 | attack | Sep 24 06:25:18 hcbbdb sshd\[11549\]: Invalid user testuser from 45.158.199.156 Sep 24 06:25:18 hcbbdb sshd\[11549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.158.199.156 Sep 24 06:25:20 hcbbdb sshd\[11549\]: Failed password for invalid user testuser from 45.158.199.156 port 34284 ssh2 Sep 24 06:31:46 hcbbdb sshd\[12256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.158.199.156 user=root Sep 24 06:31:49 hcbbdb sshd\[12256\]: Failed password for root from 45.158.199.156 port 43386 ssh2 |
2020-09-24 19:41:36 |
94.143.198.219 | attack | Unauthorised access (Sep 23) SRC=94.143.198.219 LEN=52 TTL=116 ID=10076 DF TCP DPT=445 WINDOW=8192 SYN |
2020-09-24 19:53:59 |
60.243.118.214 | attackspambots | Listed on zen-spamhaus also abuseat.org and dnsbl-sorbs / proto=6 . srcport=29379 . dstport=2323 . (2861) |
2020-09-24 19:39:22 |
210.114.17.198 | attackbots | Invalid user matlab from 210.114.17.198 port 51482 |
2020-09-24 19:34:42 |
62.133.129.37 | attackspam | php WP PHPmyadamin ABUSE blocked for 12h |
2020-09-24 19:33:15 |
20.191.251.172 | attackspambots | 20.191.251.172 (AU/Australia/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 24 11:42:05 server2 sshd[16666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.150.93.157 user=root Sep 24 11:41:20 server2 sshd[16496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.191.251.172 user=root Sep 24 11:39:04 server2 sshd[15745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.255.192.248 user=root Sep 24 11:39:04 server2 sshd[15745]: Failed password for root from 52.255.192.248 port 37050 ssh2 Sep 24 11:41:21 server2 sshd[16496]: Failed password for root from 20.191.251.172 port 51584 ssh2 Sep 24 11:44:19 server2 sshd[17445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.70.139 user=root IP Addresses Blocked: 219.150.93.157 (CN/China/-) |
2020-09-24 19:52:28 |
213.141.157.220 | attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-09-24 20:07:29 |
61.177.172.61 | attack | Sep 24 12:13:36 ip-172-31-16-56 sshd\[30726\]: Failed password for root from 61.177.172.61 port 38918 ssh2\ Sep 24 12:13:40 ip-172-31-16-56 sshd\[30726\]: Failed password for root from 61.177.172.61 port 38918 ssh2\ Sep 24 12:13:44 ip-172-31-16-56 sshd\[30726\]: Failed password for root from 61.177.172.61 port 38918 ssh2\ Sep 24 12:13:47 ip-172-31-16-56 sshd\[30726\]: Failed password for root from 61.177.172.61 port 38918 ssh2\ Sep 24 12:13:51 ip-172-31-16-56 sshd\[30726\]: Failed password for root from 61.177.172.61 port 38918 ssh2\ |
2020-09-24 20:17:32 |
51.132.17.50 | attack | Sep 24 12:20:17 l02a sshd[30251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.132.17.50 user=root Sep 24 12:20:19 l02a sshd[30251]: Failed password for root from 51.132.17.50 port 21113 ssh2 Sep 24 12:20:17 l02a sshd[30253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.132.17.50 user=root Sep 24 12:20:19 l02a sshd[30253]: Failed password for root from 51.132.17.50 port 21118 ssh2 |
2020-09-24 19:47:05 |
104.248.143.177 | attackbots | (sshd) Failed SSH login from 104.248.143.177 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 07:16:29 server2 sshd[17898]: Invalid user ts3 from 104.248.143.177 Sep 24 07:16:29 server2 sshd[17898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.143.177 Sep 24 07:16:31 server2 sshd[17898]: Failed password for invalid user ts3 from 104.248.143.177 port 42204 ssh2 Sep 24 07:22:06 server2 sshd[27544]: Invalid user topgui from 104.248.143.177 Sep 24 07:22:06 server2 sshd[27544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.143.177 |
2020-09-24 19:36:05 |
106.13.129.8 | attack | Invalid user julie from 106.13.129.8 port 55878 |
2020-09-24 20:13:10 |