城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.253.21.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.253.21.70. IN A
;; AUTHORITY SECTION:
. 588 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052401 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 04:03:09 CST 2022
;; MSG SIZE rcvd: 106
Host 70.21.253.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 70.21.253.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 34.69.73.10 | attackspambots | Automatically reported by fail2ban report script (mx1) |
2020-04-01 16:22:04 |
| 79.143.30.31 | attackbots | Apr 1 09:26:20 srv-ubuntu-dev3 sshd[25828]: Invalid user pengjunyu from 79.143.30.31 Apr 1 09:26:20 srv-ubuntu-dev3 sshd[25828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.30.31 Apr 1 09:26:20 srv-ubuntu-dev3 sshd[25828]: Invalid user pengjunyu from 79.143.30.31 Apr 1 09:26:22 srv-ubuntu-dev3 sshd[25828]: Failed password for invalid user pengjunyu from 79.143.30.31 port 44064 ssh2 Apr 1 09:31:03 srv-ubuntu-dev3 sshd[26602]: Invalid user strider from 79.143.30.31 Apr 1 09:31:03 srv-ubuntu-dev3 sshd[26602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.30.31 Apr 1 09:31:03 srv-ubuntu-dev3 sshd[26602]: Invalid user strider from 79.143.30.31 Apr 1 09:31:04 srv-ubuntu-dev3 sshd[26602]: Failed password for invalid user strider from 79.143.30.31 port 57052 ssh2 Apr 1 09:35:11 srv-ubuntu-dev3 sshd[27213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= ... |
2020-04-01 16:55:42 |
| 188.241.73.149 | attackbots | " " |
2020-04-01 16:36:01 |
| 203.109.118.116 | attackspam | Brute force SMTP login attempted. ... |
2020-04-01 16:31:08 |
| 41.144.79.101 | attackspam | Forbidden directory scan :: 2020/04/01 03:50:30 [error] 1155#1155: *80941 access forbidden by rule, client: 41.144.79.101, server: [censored_1], request: "GET /knowledge-base/... HTTP/1.1", host: "www.[censored_1]" |
2020-04-01 16:46:40 |
| 103.108.144.245 | attackspam | Apr 1 10:32:28 vserver sshd\[8875\]: Failed password for root from 103.108.144.245 port 53066 ssh2Apr 1 10:36:43 vserver sshd\[8937\]: Failed password for root from 103.108.144.245 port 58258 ssh2Apr 1 10:40:51 vserver sshd\[9029\]: Invalid user weiq from 103.108.144.245Apr 1 10:40:53 vserver sshd\[9029\]: Failed password for invalid user weiq from 103.108.144.245 port 35225 ssh2 ... |
2020-04-01 16:46:19 |
| 120.132.13.151 | attackbots | Invalid user yanzhiping from 120.132.13.151 port 51406 |
2020-04-01 16:18:05 |
| 122.165.233.7 | attackspam | (imapd) Failed IMAP login from 122.165.233.7 (IN/India/abts-tn-static-007.233.165.122.airtelbroadband.in): 1 in the last 3600 secs |
2020-04-01 16:51:57 |
| 31.13.32.186 | attack | $f2bV_matches |
2020-04-01 16:07:12 |
| 139.59.190.69 | attackspam | 2020-04-01T06:33:20.423779abusebot-3.cloudsearch.cf sshd[23026]: Invalid user deploy from 139.59.190.69 port 60849 2020-04-01T06:33:20.430808abusebot-3.cloudsearch.cf sshd[23026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.190.69 2020-04-01T06:33:20.423779abusebot-3.cloudsearch.cf sshd[23026]: Invalid user deploy from 139.59.190.69 port 60849 2020-04-01T06:33:22.190408abusebot-3.cloudsearch.cf sshd[23026]: Failed password for invalid user deploy from 139.59.190.69 port 60849 ssh2 2020-04-01T06:36:57.107283abusebot-3.cloudsearch.cf sshd[23254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.190.69 user=root 2020-04-01T06:36:58.660736abusebot-3.cloudsearch.cf sshd[23254]: Failed password for root from 139.59.190.69 port 38706 ssh2 2020-04-01T06:40:26.039663abusebot-3.cloudsearch.cf sshd[23473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59. ... |
2020-04-01 16:10:23 |
| 220.190.23.57 | attackspambots | 1433/tcp 1433/tcp 1433/tcp... [2020-04-01]6pkt,1pt.(tcp) |
2020-04-01 16:56:27 |
| 85.14.127.199 | attackbotsspam | SSH brute force attempt |
2020-04-01 16:26:21 |
| 222.182.118.116 | attackbots | Wed Apr 1 06:01:23 2020 \[pid 28345\] \[anonymous\] FAIL LOGIN: Client "222.182.118.116" Wed Apr 1 06:01:27 2020 \[pid 28347\] \[www\] FAIL LOGIN: Client "222.182.118.116" Wed Apr 1 06:01:32 2020 \[pid 28351\] \[www\] FAIL LOGIN: Client "222.182.118.116" Wed Apr 1 06:01:36 2020 \[pid 28353\] \[www\] FAIL LOGIN: Client "222.182.118.116" Wed Apr 1 06:01:40 2020 \[pid 28389\] \[www\] FAIL LOGIN: Client "222.182.118.116" |
2020-04-01 16:23:53 |
| 106.54.19.67 | attackbots | Invalid user rle from 106.54.19.67 port 60646 |
2020-04-01 16:41:22 |
| 41.226.11.252 | attack | Invalid user lcb from 41.226.11.252 port 6642 |
2020-04-01 16:53:49 |