城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.218.193.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.218.193.42.			IN	A
;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:58:48 CST 2022
;; MSG SIZE  rcvd: 107Host 42.193.218.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 42.193.218.104.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 51.38.225.124 | attackbotsspam | Apr 29 23:44:13 itv-usvr-01 sshd[22595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124 user=root Apr 29 23:44:15 itv-usvr-01 sshd[22595]: Failed password for root from 51.38.225.124 port 46070 ssh2 Apr 29 23:53:54 itv-usvr-01 sshd[23395]: Invalid user daniel from 51.38.225.124 Apr 29 23:53:54 itv-usvr-01 sshd[23395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124 Apr 29 23:53:54 itv-usvr-01 sshd[23395]: Invalid user daniel from 51.38.225.124 Apr 29 23:53:57 itv-usvr-01 sshd[23395]: Failed password for invalid user daniel from 51.38.225.124 port 49144 ssh2 | 2020-04-30 01:50:28 | 
| 51.38.186.180 | attack | Apr 29 18:33:35 lukav-desktop sshd\[7458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180 user=mysql Apr 29 18:33:37 lukav-desktop sshd\[7458\]: Failed password for mysql from 51.38.186.180 port 36252 ssh2 Apr 29 18:37:42 lukav-desktop sshd\[9945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180 user=root Apr 29 18:37:45 lukav-desktop sshd\[9945\]: Failed password for root from 51.38.186.180 port 41948 ssh2 Apr 29 18:41:47 lukav-desktop sshd\[12701\]: Invalid user carla from 51.38.186.180 | 2020-04-30 01:50:46 | 
| 89.176.9.98 | attack | Invalid user yb from 89.176.9.98 port 34654 | 2020-04-30 02:14:15 | 
| 140.86.12.31 | attackspam | $f2bV_matches | 2020-04-30 02:05:42 | 
| 122.152.197.6 | attackspam | $f2bV_matches | 2020-04-30 01:33:39 | 
| 118.25.27.67 | attackbots | $f2bV_matches | 2020-04-30 01:34:53 | 
| 38.73.238.138 | attack | Failed password for postgres from 38.73.238.138 port 39572 ssh2 | 2020-04-30 01:52:36 | 
| 165.22.143.3 | attackbots | Apr 29 16:29:40 XXXXXX sshd[1423]: Invalid user ftpadmin from 165.22.143.3 port 40770 | 2020-04-30 02:02:58 | 
| 111.231.133.72 | attackspambots | Failed password for root from 111.231.133.72 port 59456 ssh2 | 2020-04-30 01:37:33 | 
| 128.199.155.218 | attackspam | $f2bV_matches | 2020-04-30 01:32:47 | 
| 193.112.22.34 | attackspam | Invalid user ftpuser from 193.112.22.34 port 58377 | 2020-04-30 01:57:21 | 
| 104.248.130.10 | attack | Apr 29 19:47:08 rotator sshd\[28364\]: Invalid user satis from 104.248.130.10Apr 29 19:47:11 rotator sshd\[28364\]: Failed password for invalid user satis from 104.248.130.10 port 49496 ssh2Apr 29 19:49:57 rotator sshd\[28376\]: Failed password for root from 104.248.130.10 port 42274 ssh2Apr 29 19:53:00 rotator sshd\[29144\]: Invalid user gh from 104.248.130.10Apr 29 19:53:02 rotator sshd\[29144\]: Failed password for invalid user gh from 104.248.130.10 port 35056 ssh2Apr 29 19:55:55 rotator sshd\[29901\]: Failed password for root from 104.248.130.10 port 56068 ssh2 ... | 2020-04-30 02:12:50 | 
| 182.254.154.89 | attack | Invalid user zabbix from 182.254.154.89 port 35038 | 2020-04-30 01:58:58 | 
| 51.38.130.63 | attack | Apr 29 18:02:13 prox sshd[4127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.130.63 Apr 29 18:02:15 prox sshd[4127]: Failed password for invalid user lord from 51.38.130.63 port 33704 ssh2 | 2020-04-30 01:51:14 | 
| 51.89.164.153 | attackspam | Failed password for root from 51.89.164.153 port 41262 ssh2 | 2020-04-30 01:49:25 |