城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.81.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.81.204. IN A
;; AUTHORITY SECTION:
. 508 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:02:34 CST 2022
;; MSG SIZE rcvd: 106
Host 204.81.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 204.81.21.104.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
180.101.221.152 | attackspambots | Sep 12 01:39:56 localhost sshd\[26071\]: Invalid user testftp from 180.101.221.152 port 49988 Sep 12 01:39:56 localhost sshd\[26071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.221.152 Sep 12 01:39:58 localhost sshd\[26071\]: Failed password for invalid user testftp from 180.101.221.152 port 49988 ssh2 |
2019-09-12 07:40:28 |
218.92.0.175 | attack | [ssh] SSH attack |
2019-09-12 08:16:51 |
118.89.35.168 | attackspambots | Sep 11 21:24:04 legacy sshd[26672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.168 Sep 11 21:24:06 legacy sshd[26672]: Failed password for invalid user mysql from 118.89.35.168 port 38564 ssh2 Sep 11 21:28:04 legacy sshd[26785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.35.168 ... |
2019-09-12 07:44:01 |
14.143.8.236 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 18:20:06,734 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.143.8.236) |
2019-09-12 07:57:08 |
58.144.151.10 | attackbotsspam | Sep 12 02:06:15 markkoudstaal sshd[10863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.10 Sep 12 02:06:17 markkoudstaal sshd[10863]: Failed password for invalid user appuser from 58.144.151.10 port 15188 ssh2 Sep 12 02:09:22 markkoudstaal sshd[11188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.10 |
2019-09-12 08:15:05 |
103.248.119.44 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 18:25:26,154 INFO [amun_request_handler] PortScan Detected on Port: 445 (103.248.119.44) |
2019-09-12 07:36:29 |
113.57.130.172 | attack | Lines containing failures of 113.57.130.172 (max 1000) Sep 9 06:27:59 localhost sshd[14907]: Invalid user nagios from 113.57.130.172 port 42796 Sep 9 06:27:59 localhost sshd[14907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.130.172 Sep 9 06:28:01 localhost sshd[14907]: Failed password for invalid user nagios from 113.57.130.172 port 42796 ssh2 Sep 9 06:28:03 localhost sshd[14907]: Received disconnect from 113.57.130.172 port 42796:11: Bye Bye [preauth] Sep 9 06:28:03 localhost sshd[14907]: Disconnected from invalid user nagios 113.57.130.172 port 42796 [preauth] Sep 9 06:42:15 localhost sshd[16958]: Invalid user ftp_user from 113.57.130.172 port 52656 Sep 9 06:42:15 localhost sshd[16958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.130.172 Sep 9 06:42:17 localhost sshd[16958]: Failed password for invalid user ftp_user from 113.57.130.172 port 52656 ssh2 Sep ........ ------------------------------ |
2019-09-12 08:14:00 |
138.68.53.163 | attackbotsspam | Sep 11 13:40:18 sachi sshd\[13895\]: Invalid user test from 138.68.53.163 Sep 11 13:40:18 sachi sshd\[13895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.53.163 Sep 11 13:40:20 sachi sshd\[13895\]: Failed password for invalid user test from 138.68.53.163 port 60268 ssh2 Sep 11 13:46:05 sachi sshd\[14426\]: Invalid user ubuntu from 138.68.53.163 Sep 11 13:46:05 sachi sshd\[14426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.53.163 |
2019-09-12 07:47:48 |
174.233.134.163 | attackspambots | Port Scan: TCP/443 |
2019-09-12 08:07:11 |
203.95.212.41 | attack | Sep 11 12:22:39 php2 sshd\[10499\]: Invalid user deploy123 from 203.95.212.41 Sep 11 12:22:39 php2 sshd\[10499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41 Sep 11 12:22:41 php2 sshd\[10499\]: Failed password for invalid user deploy123 from 203.95.212.41 port 36223 ssh2 Sep 11 12:29:56 php2 sshd\[11515\]: Invalid user a1b1c3 from 203.95.212.41 Sep 11 12:29:56 php2 sshd\[11515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41 |
2019-09-12 08:07:51 |
106.52.125.243 | attackbotsspam | Sep 12 01:48:00 SilenceServices sshd[26204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.125.243 Sep 12 01:48:02 SilenceServices sshd[26204]: Failed password for invalid user 123 from 106.52.125.243 port 48816 ssh2 Sep 12 01:51:37 SilenceServices sshd[30164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.125.243 |
2019-09-12 08:10:18 |
167.99.83.237 | attackspambots | Sep 12 01:56:26 vps691689 sshd[7488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.83.237 Sep 12 01:56:28 vps691689 sshd[7488]: Failed password for invalid user user1 from 167.99.83.237 port 43590 ssh2 Sep 12 02:01:26 vps691689 sshd[7604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.83.237 ... |
2019-09-12 08:11:37 |
131.108.191.121 | attack | SMTP-sasl brute force ... |
2019-09-12 07:48:22 |
146.185.175.132 | attack | Sep 11 23:05:37 MK-Soft-VM6 sshd\[3037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.175.132 user=mysql Sep 11 23:05:40 MK-Soft-VM6 sshd\[3037\]: Failed password for mysql from 146.185.175.132 port 42234 ssh2 Sep 11 23:11:49 MK-Soft-VM6 sshd\[3060\]: Invalid user admin from 146.185.175.132 port 55080 ... |
2019-09-12 07:52:39 |
95.222.252.254 | attack | Sep 11 17:50:18 vps200512 sshd\[11182\]: Invalid user 1234qwer from 95.222.252.254 Sep 11 17:50:18 vps200512 sshd\[11182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.222.252.254 Sep 11 17:50:19 vps200512 sshd\[11182\]: Failed password for invalid user 1234qwer from 95.222.252.254 port 39061 ssh2 Sep 11 17:56:10 vps200512 sshd\[11274\]: Invalid user oracle!@\# from 95.222.252.254 Sep 11 17:56:10 vps200512 sshd\[11274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.222.252.254 |
2019-09-12 07:43:18 |