城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.216.105.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.216.105.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 20:17:36 CST 2025
;; MSG SIZE rcvd: 107
30.105.216.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.105.216.104.in-addr.arpa name = unassigned.psychz.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 88.156.122.72 | attack | Jul 20 17:32:01 vm1 sshd[15571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.156.122.72 Jul 20 17:32:02 vm1 sshd[15571]: Failed password for invalid user trixie from 88.156.122.72 port 53832 ssh2 ... |
2020-07-21 03:55:03 |
| 182.122.71.139 | attackbotsspam | 2020-07-20T21:04:35.482367sd-86998 sshd[21324]: Invalid user rsl from 182.122.71.139 port 16708 2020-07-20T21:04:35.489021sd-86998 sshd[21324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.71.139 2020-07-20T21:04:35.482367sd-86998 sshd[21324]: Invalid user rsl from 182.122.71.139 port 16708 2020-07-20T21:04:37.934436sd-86998 sshd[21324]: Failed password for invalid user rsl from 182.122.71.139 port 16708 ssh2 2020-07-20T21:08:47.960669sd-86998 sshd[21826]: Invalid user dna from 182.122.71.139 port 18968 ... |
2020-07-21 03:29:39 |
| 66.131.216.79 | attackspam | Jul 20 18:57:19 jumpserver sshd[158760]: Invalid user ide from 66.131.216.79 port 41419 Jul 20 18:57:21 jumpserver sshd[158760]: Failed password for invalid user ide from 66.131.216.79 port 41419 ssh2 Jul 20 19:06:22 jumpserver sshd[158908]: Invalid user dod from 66.131.216.79 port 55833 ... |
2020-07-21 03:35:22 |
| 112.85.42.195 | attackbots | Jul 20 19:49:41 onepixel sshd[1840191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195 user=root Jul 20 19:49:44 onepixel sshd[1840191]: Failed password for root from 112.85.42.195 port 63739 ssh2 Jul 20 19:49:41 onepixel sshd[1840191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195 user=root Jul 20 19:49:44 onepixel sshd[1840191]: Failed password for root from 112.85.42.195 port 63739 ssh2 Jul 20 19:49:47 onepixel sshd[1840191]: Failed password for root from 112.85.42.195 port 63739 ssh2 |
2020-07-21 03:51:50 |
| 178.62.9.122 | attackbots | Automatic report - XMLRPC Attack |
2020-07-21 03:32:54 |
| 68.183.154.109 | attackspambots | 2020-07-18 01:57:39 server sshd[485]: Failed password for invalid user admin from 68.183.154.109 port 57906 ssh2 |
2020-07-21 03:30:34 |
| 106.12.140.168 | attackspambots | 2020-07-20 04:45:15 server sshd[3579]: Failed password for invalid user lky from 106.12.140.168 port 48118 ssh2 |
2020-07-21 03:40:28 |
| 202.163.126.134 | attackspambots | "fail2ban match" |
2020-07-21 03:32:39 |
| 202.5.23.73 | attackspam | 2020-07-20T13:06:22.502112hostname sshd[61366]: Failed password for invalid user test from 202.5.23.73 port 46646 ssh2 ... |
2020-07-21 03:28:30 |
| 104.248.122.143 | attackspambots | $f2bV_matches |
2020-07-21 03:53:12 |
| 139.59.80.88 | attackbots | Automatic Fail2ban report - Trying login SSH |
2020-07-21 03:54:31 |
| 193.112.111.28 | attack | Jul 20 18:32:34 debian-2gb-nbg1-2 kernel: \[17521293.360550\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=193.112.111.28 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=24602 PROTO=TCP SPT=58075 DPT=4825 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-21 03:19:37 |
| 118.24.30.97 | attackbots | Automatic report BANNED IP |
2020-07-21 03:43:32 |
| 217.126.115.60 | attackbotsspam | 2020-07-20T13:56:02.9796631495-001 sshd[16118]: Failed password for mysql from 217.126.115.60 port 41860 ssh2 2020-07-20T14:00:42.6764401495-001 sshd[16330]: Invalid user administrator from 217.126.115.60 port 56644 2020-07-20T14:00:42.6798041495-001 sshd[16330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.red-217-126-115.staticip.rima-tde.net 2020-07-20T14:00:42.6764401495-001 sshd[16330]: Invalid user administrator from 217.126.115.60 port 56644 2020-07-20T14:00:44.5892111495-001 sshd[16330]: Failed password for invalid user administrator from 217.126.115.60 port 56644 ssh2 2020-07-20T14:05:33.8863991495-001 sshd[16566]: Invalid user gaojian from 217.126.115.60 port 43188 ... |
2020-07-21 03:23:52 |
| 47.108.160.207 | attack | Jul 20 14:25:53 mailserver sshd\[23242\]: Invalid user administrador from 47.108.160.207 ... |
2020-07-21 03:53:32 |