城市(city): Toronto
省份(region): Ontario
国家(country): Canada
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.234.221.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.234.221.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025041201 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 13 06:58:12 CST 2025
;; MSG SIZE rcvd: 108
Host 142.221.234.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.221.234.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.255.102.50 | attackbots | 1582464216 - 02/23/2020 14:23:36 Host: 139.255.102.50/139.255.102.50 Port: 445 TCP Blocked |
2020-02-24 04:57:56 |
| 104.248.90.77 | attack | Feb 23 15:31:40 prox sshd[4082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.90.77 Feb 23 15:31:41 prox sshd[4082]: Failed password for invalid user mattermos from 104.248.90.77 port 34474 ssh2 |
2020-02-24 05:10:54 |
| 117.85.92.204 | attack | Brute force blocker - service: proftpd1 - aantal: 44 - Tue Jun 5 14:40:14 2018 |
2020-02-24 05:28:59 |
| 192.99.8.171 | attackspambots | Brute force blocker - service: exim2 - aantal: 34 - Thu Jun 7 06:40:18 2018 |
2020-02-24 05:07:00 |
| 112.85.42.180 | attack | Feb 23 21:56:01 mail sshd[940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180 user=root Feb 23 21:56:03 mail sshd[940]: Failed password for root from 112.85.42.180 port 46382 ssh2 ... |
2020-02-24 04:56:22 |
| 27.79.217.202 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 27.79.217.202 (localhost): 5 in the last 3600 secs - Thu Jun 7 00:24:42 2018 |
2020-02-24 05:19:38 |
| 93.152.159.11 | attack | Feb 23 14:23:38 |
2020-02-24 04:54:59 |
| 63.151.23.139 | attack | lfd: (smtpauth) Failed SMTP AUTH login from 63.151.23.139 (US/United States/-): 5 in the last 3600 secs - Wed Jun 6 11:08:51 2018 |
2020-02-24 05:23:10 |
| 152.89.104.165 | attackspam | SSH Brute-Force attacks |
2020-02-24 04:57:26 |
| 149.56.89.123 | attackbots | Feb 23 05:53:53 sachi sshd\[8258\]: Invalid user hammad from 149.56.89.123 Feb 23 05:53:53 sachi sshd\[8258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123 Feb 23 05:53:55 sachi sshd\[8258\]: Failed password for invalid user hammad from 149.56.89.123 port 36363 ssh2 Feb 23 05:56:29 sachi sshd\[8476\]: Invalid user guest from 149.56.89.123 Feb 23 05:56:29 sachi sshd\[8476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123 |
2020-02-24 05:10:06 |
| 212.22.67.110 | attackspam | Invalid user teamspeak from 212.22.67.110 port 59032 |
2020-02-24 05:06:47 |
| 222.186.175.183 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Failed password for root from 222.186.175.183 port 56712 ssh2 Failed password for root from 222.186.175.183 port 56712 ssh2 Failed password for root from 222.186.175.183 port 56712 ssh2 Failed password for root from 222.186.175.183 port 56712 ssh2 |
2020-02-24 05:20:05 |
| 104.244.78.197 | attack | k+ssh-bruteforce |
2020-02-24 05:09:21 |
| 104.42.117.86 | attackbotsspam | lfd: (smtpauth) Failed SMTP AUTH login from 104.42.117.86 (-): 5 in the last 3600 secs - Sat Jun 9 01:58:47 2018 |
2020-02-24 04:58:41 |
| 182.75.216.190 | attack | $f2bV_matches |
2020-02-24 05:17:41 |