城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.77.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.77.157. IN A
;; AUTHORITY SECTION:
. 207 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:25:20 CST 2022
;; MSG SIZE rcvd: 106
Host 157.77.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 157.77.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.74.42.157 | attack | Unauthorised access (Jul 31) SRC=36.74.42.157 LEN=52 TOS=0x10 PREC=0x40 TTL=117 ID=6442 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-01 00:24:38 |
| 218.161.0.4 | attackbots | Automatic report - Banned IP Access |
2020-08-01 00:42:06 |
| 129.28.77.179 | attackbotsspam | 2020-07-31T14:28:34.583832shield sshd\[7240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.77.179 user=root 2020-07-31T14:28:36.860081shield sshd\[7240\]: Failed password for root from 129.28.77.179 port 40540 ssh2 2020-07-31T14:30:59.931051shield sshd\[7809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.77.179 user=root 2020-07-31T14:31:02.112080shield sshd\[7809\]: Failed password for root from 129.28.77.179 port 36290 ssh2 2020-07-31T14:33:23.350740shield sshd\[8311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.77.179 user=root |
2020-08-01 00:37:25 |
| 103.242.56.182 | attack | Jul 31 07:45:46 propaganda sshd[48525]: Connection from 103.242.56.182 port 35235 on 10.0.0.160 port 22 rdomain "" Jul 31 07:45:46 propaganda sshd[48525]: Connection closed by 103.242.56.182 port 35235 [preauth] |
2020-07-31 23:53:49 |
| 101.231.133.165 | attackbotsspam | Automatic report generated by Wazuh |
2020-08-01 00:21:01 |
| 84.38.184.53 | attackspam | 07/31/2020-11:25:21.430095 84.38.184.53 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-08-01 00:37:57 |
| 2.48.3.18 | attackbots | SSH invalid-user multiple login try |
2020-08-01 00:33:34 |
| 108.61.199.102 | attackbots | Jul 31 12:21:16 ny01 sshd[339]: Failed password for root from 108.61.199.102 port 33826 ssh2 Jul 31 12:21:24 ny01 sshd[339]: Failed password for root from 108.61.199.102 port 33826 ssh2 Jul 31 12:21:25 ny01 sshd[339]: Failed password for root from 108.61.199.102 port 33826 ssh2 Jul 31 12:21:25 ny01 sshd[339]: error: maximum authentication attempts exceeded for root from 108.61.199.102 port 33826 ssh2 [preauth] |
2020-08-01 00:29:49 |
| 129.213.112.175 | attackbotsspam | Zeroshell Net Services Remote Command Execution Vulnerability |
2020-08-01 00:36:43 |
| 200.187.118.11 | attackspam | Jul 30 20:57:20 db01 sshd[12225]: Invalid user akshay from 200.187.118.11 Jul 30 20:57:20 db01 sshd[12225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.118.11 Jul 30 20:57:22 db01 sshd[12225]: Failed password for invalid user akshay from 200.187.118.11 port 48886 ssh2 Jul 30 20:57:22 db01 sshd[12225]: Received disconnect from 200.187.118.11: 11: Bye Bye [preauth] Jul 30 21:05:09 db01 sshd[13237]: Invalid user wangwei from 200.187.118.11 Jul 30 21:05:09 db01 sshd[13237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.118.11 Jul 30 21:05:11 db01 sshd[13237]: Failed password for invalid user wangwei from 200.187.118.11 port 41340 ssh2 Jul 30 21:05:12 db01 sshd[13237]: Received disconnect from 200.187.118.11: 11: Bye Bye [preauth] Jul 30 21:09:59 db01 sshd[13705]: Invalid user lixj from 200.187.118.11 Jul 30 21:09:59 db01 sshd[13705]: pam_unix(sshd:auth): authentication fa........ ------------------------------- |
2020-08-01 00:11:56 |
| 191.53.197.204 | attack | Jul 31 13:43:39 mail.srvfarm.net postfix/smtps/smtpd[344851]: warning: unknown[191.53.197.204]: SASL PLAIN authentication failed: Jul 31 13:43:39 mail.srvfarm.net postfix/smtps/smtpd[344851]: lost connection after AUTH from unknown[191.53.197.204] Jul 31 13:45:35 mail.srvfarm.net postfix/smtpd[346667]: warning: unknown[191.53.197.204]: SASL PLAIN authentication failed: Jul 31 13:45:35 mail.srvfarm.net postfix/smtpd[346667]: lost connection after AUTH from unknown[191.53.197.204] Jul 31 13:47:49 mail.srvfarm.net postfix/smtps/smtpd[344851]: warning: unknown[191.53.197.204]: SASL PLAIN authentication failed: |
2020-08-01 00:26:32 |
| 109.24.144.69 | attackspambots | Brute force attempt |
2020-07-31 23:56:54 |
| 209.97.138.179 | attackbots | Jul 31 12:06:09 IngegnereFirenze sshd[6168]: User root from 209.97.138.179 not allowed because not listed in AllowUsers ... |
2020-08-01 00:12:55 |
| 184.105.139.81 | attack | GPL RPC xdmcp info query - port: 177 proto: udp cat: Attempted Information Leakbytes: 60 |
2020-08-01 00:23:44 |
| 182.61.3.157 | attack | SSH Brute Force |
2020-08-01 00:11:17 |