城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.92.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.92.57. IN A
;; AUTHORITY SECTION:
. 479 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:16:35 CST 2022
;; MSG SIZE rcvd: 105
Host 57.92.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 57.92.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 123.133.78.120 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-24 06:28:57 |
| 5.149.206.240 | attack | Dec 23 19:23:47 mail sshd\[23042\]: Invalid user ottes from 5.149.206.240 Dec 23 19:23:47 mail sshd\[23042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.149.206.240 Dec 23 19:23:50 mail sshd\[23042\]: Failed password for invalid user ottes from 5.149.206.240 port 38661 ssh2 ... |
2019-12-24 06:47:04 |
| 216.218.206.92 | attackspambots | 3389BruteforceFW21 |
2019-12-24 06:20:06 |
| 106.13.115.197 | attackspambots | Dec 23 15:53:35 srv206 sshd[3380]: Invalid user vdr from 106.13.115.197 Dec 23 15:53:35 srv206 sshd[3380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.115.197 Dec 23 15:53:35 srv206 sshd[3380]: Invalid user vdr from 106.13.115.197 Dec 23 15:53:37 srv206 sshd[3380]: Failed password for invalid user vdr from 106.13.115.197 port 44004 ssh2 ... |
2019-12-24 06:16:05 |
| 81.211.18.114 | attackbotsspam | 81.211.18.114 - - [23/Dec/2019:09:53:28 -0500] "GET /index.cfm?page=../../../../../etc/passwd&manufacturerID=15&collectionID=161 HTTP/1.1" 200 19255 "https:// /index.cfm?page=../../../../../etc/passwd&manufacturerID=15&collectionID=161" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-12-24 06:24:27 |
| 74.82.47.15 | attack | 8080/tcp 11211/tcp 4786/tcp... [2019-10-25/12-23]42pkt,10pt.(tcp),2pt.(udp) |
2019-12-24 06:16:28 |
| 43.229.128.128 | attack | 2019-12-23T19:14:10.666729abusebot-5.cloudsearch.cf sshd[11766]: Invalid user marler from 43.229.128.128 port 2572 2019-12-23T19:14:10.680483abusebot-5.cloudsearch.cf sshd[11766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.128.128 2019-12-23T19:14:10.666729abusebot-5.cloudsearch.cf sshd[11766]: Invalid user marler from 43.229.128.128 port 2572 2019-12-23T19:14:12.539597abusebot-5.cloudsearch.cf sshd[11766]: Failed password for invalid user marler from 43.229.128.128 port 2572 ssh2 2019-12-23T19:22:45.699392abusebot-5.cloudsearch.cf sshd[11770]: Invalid user hisaki from 43.229.128.128 port 2514 2019-12-23T19:22:45.712090abusebot-5.cloudsearch.cf sshd[11770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.128.128 2019-12-23T19:22:45.699392abusebot-5.cloudsearch.cf sshd[11770]: Invalid user hisaki from 43.229.128.128 port 2514 2019-12-23T19:22:47.270338abusebot-5.cloudsearch.cf sshd[11770]: ... |
2019-12-24 06:18:09 |
| 128.199.162.2 | attackbotsspam | Dec 23 22:11:27 DAAP sshd[25279]: Invalid user taiwana from 128.199.162.2 port 41305 Dec 23 22:11:27 DAAP sshd[25279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 Dec 23 22:11:27 DAAP sshd[25279]: Invalid user taiwana from 128.199.162.2 port 41305 Dec 23 22:11:29 DAAP sshd[25279]: Failed password for invalid user taiwana from 128.199.162.2 port 41305 ssh2 Dec 23 22:16:08 DAAP sshd[25329]: Invalid user margolin from 128.199.162.2 port 57468 ... |
2019-12-24 06:26:30 |
| 210.126.1.36 | attack | Brute-force attempt banned |
2019-12-24 06:23:34 |
| 222.186.175.151 | attackspam | 2019-12-21 06:59:05 -> 2019-12-23 11:32:23 : 66 login attempts (222.186.175.151) |
2019-12-24 06:17:19 |
| 45.93.20.138 | attackbots | 56208/tcp 24179/tcp 18281/tcp... [2019-11-27/12-23]19pkt,19pt.(tcp) |
2019-12-24 06:23:02 |
| 195.22.240.220 | attack | Dec 23 15:54:42 game-panel sshd[27608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.22.240.220 Dec 23 15:54:44 game-panel sshd[27608]: Failed password for invalid user antkowiak from 195.22.240.220 port 52410 ssh2 Dec 23 16:00:53 game-panel sshd[27845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.22.240.220 |
2019-12-24 06:41:49 |
| 111.67.205.212 | attackbotsspam | Dec 23 18:26:35 legacy sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.205.212 Dec 23 18:26:37 legacy sshd[28480]: Failed password for invalid user fujiokaroot from 111.67.205.212 port 46469 ssh2 Dec 23 18:30:21 legacy sshd[28582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.205.212 ... |
2019-12-24 06:11:57 |
| 52.73.169.169 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2019-12-24 06:12:33 |
| 191.136.229.148 | attackspambots | Unauthorized connection attempt detected from IP address 191.136.229.148 to port 445 |
2019-12-24 06:20:32 |