城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.94.236
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.94.236. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:18:46 CST 2022
;; MSG SIZE rcvd: 106
Host 236.94.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 236.94.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.61.176.105 | attackspam | Automatic report - Banned IP Access |
2019-10-26 00:09:39 |
| 188.165.242.200 | attackspam | Oct 25 17:46:14 XXX sshd[2415]: Invalid user ofsaa from 188.165.242.200 port 58388 |
2019-10-26 00:07:03 |
| 188.68.211.114 | attackbotsspam | " " |
2019-10-25 23:56:35 |
| 159.89.134.199 | attackspambots | 2019-10-25T17:43:40.230758lon01.zurich-datacenter.net sshd\[4867\]: Invalid user test7 from 159.89.134.199 port 37642 2019-10-25T17:43:40.237698lon01.zurich-datacenter.net sshd\[4867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199 2019-10-25T17:43:42.185701lon01.zurich-datacenter.net sshd\[4867\]: Failed password for invalid user test7 from 159.89.134.199 port 37642 ssh2 2019-10-25T17:47:59.617058lon01.zurich-datacenter.net sshd\[4965\]: Invalid user support from 159.89.134.199 port 48984 2019-10-25T17:47:59.623320lon01.zurich-datacenter.net sshd\[4965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199 ... |
2019-10-26 00:24:47 |
| 58.85.108.82 | attackbotsspam | Unauthorised access (Oct 25) SRC=58.85.108.82 LEN=40 TTL=47 ID=65413 TCP DPT=8080 WINDOW=27670 SYN Unauthorised access (Oct 25) SRC=58.85.108.82 LEN=40 TTL=47 ID=64293 TCP DPT=8080 WINDOW=27670 SYN Unauthorised access (Oct 24) SRC=58.85.108.82 LEN=40 TTL=47 ID=56064 TCP DPT=8080 WINDOW=27670 SYN |
2019-10-25 23:52:53 |
| 106.12.49.118 | attackbots | Automatic report - Banned IP Access |
2019-10-25 23:57:53 |
| 80.211.79.117 | attackspam | Oct 25 17:42:15 MK-Soft-Root2 sshd[7236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.117 Oct 25 17:42:17 MK-Soft-Root2 sshd[7236]: Failed password for invalid user dietpi from 80.211.79.117 port 40226 ssh2 ... |
2019-10-25 23:54:06 |
| 159.65.8.65 | attack | Oct 25 02:33:37 sachi sshd\[23083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65 user=root Oct 25 02:33:38 sachi sshd\[23083\]: Failed password for root from 159.65.8.65 port 59462 ssh2 Oct 25 02:37:41 sachi sshd\[23419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65 user=root Oct 25 02:37:43 sachi sshd\[23419\]: Failed password for root from 159.65.8.65 port 40576 ssh2 Oct 25 02:41:51 sachi sshd\[23837\]: Invalid user user3 from 159.65.8.65 Oct 25 02:41:51 sachi sshd\[23837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65 |
2019-10-26 00:27:25 |
| 197.114.64.94 | attackspambots | Oct 25 14:01:13 mxgate1 postfix/postscreen[20152]: CONNECT from [197.114.64.94]:40457 to [176.31.12.44]:25 Oct 25 14:01:13 mxgate1 postfix/dnsblog[20677]: addr 197.114.64.94 listed by domain zen.spamhaus.org as 127.0.0.11 Oct 25 14:01:19 mxgate1 postfix/postscreen[20152]: DNSBL rank 2 for [197.114.64.94]:40457 Oct x@x Oct 25 14:01:19 mxgate1 postfix/postscreen[20152]: HANGUP after 0.86 from [197.114.64.94]:40457 in tests after SMTP handshake Oct 25 14:01:19 mxgate1 postfix/postscreen[20152]: DISCONNECT [197.114.64.94]:40457 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=197.114.64.94 |
2019-10-26 00:14:37 |
| 110.18.243.70 | attackspambots | 2019-10-25T23:05:43.804439enmeeting.mahidol.ac.th sshd\[13860\]: User root from 110.18.243.70 not allowed because not listed in AllowUsers 2019-10-25T23:05:43.931870enmeeting.mahidol.ac.th sshd\[13860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.18.243.70 user=root 2019-10-25T23:05:45.840482enmeeting.mahidol.ac.th sshd\[13860\]: Failed password for invalid user root from 110.18.243.70 port 34975 ssh2 ... |
2019-10-26 00:20:38 |
| 47.244.9.129 | attack | 1,44-11/03 [bc01/m06] PostRequest-Spammer scoring: maputo01_x2b |
2019-10-26 00:30:47 |
| 112.21.191.253 | attackspam | Oct 25 10:35:42 django sshd[77234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253 user=r.r Oct 25 10:35:43 django sshd[77234]: Failed password for r.r from 112.21.191.253 port 59902 ssh2 Oct 25 10:35:44 django sshd[77235]: Received disconnect from 112.21.191.253: 11: Bye Bye Oct 25 10:59:33 django sshd[79002]: Invalid user tecnici from 112.21.191.253 Oct 25 10:59:33 django sshd[79002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253 Oct 25 10:59:35 django sshd[79002]: Failed password for invalid user tecnici from 112.21.191.253 port 56942 ssh2 Oct 25 10:59:36 django sshd[79003]: Received disconnect from 112.21.191.253: 11: Bye Bye Oct 25 11:04:50 django sshd[79470]: Invalid user hm from 112.21.191.253 Oct 25 11:04:50 django sshd[79470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253 ........ ----------------------------------------------- |
2019-10-26 00:08:53 |
| 51.83.98.52 | attack | 2019-10-25T17:40:29.013358scmdmz1 sshd\[27990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.ip-51-83-98.eu user=root 2019-10-25T17:40:30.977418scmdmz1 sshd\[27990\]: Failed password for root from 51.83.98.52 port 41670 ssh2 2019-10-25T17:44:19.330150scmdmz1 sshd\[28313\]: Invalid user test from 51.83.98.52 port 51850 ... |
2019-10-25 23:57:25 |
| 212.92.120.248 | attackspam | Multiple failed RDP login attempts |
2019-10-25 23:48:23 |
| 211.104.171.239 | attackbots | Oct 25 16:57:43 root sshd[25969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239 Oct 25 16:57:46 root sshd[25969]: Failed password for invalid user test123 from 211.104.171.239 port 35805 ssh2 Oct 25 17:02:34 root sshd[26048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239 ... |
2019-10-26 00:05:57 |