城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.254.86.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.254.86.93. IN A
;; AUTHORITY SECTION:
. 199 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:29:07 CST 2022
;; MSG SIZE rcvd: 106
Host 93.86.254.104.in-addr.arpa not found: 2(SERVFAIL)
server can't find 104.254.86.93.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 193.32.160.150 | attackspambots | 2019-10-17 21:54:00 H=\(\[193.32.160.146\]\) \[193.32.160.150\] F=\ |
2019-10-18 03:57:13 |
| 41.220.13.103 | attackbotsspam | Oct 17 22:49:21 sauna sshd[25545]: Failed password for root from 41.220.13.103 port 34228 ssh2 ... |
2019-10-18 03:58:02 |
| 185.53.88.127 | attack | Oct 17 21:53:43 mail kernel: [1055265.648918] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=185.53.88.127 DST=77.73.69.240 LEN=418 TOS=0x00 PREC=0x00 TTL=55 ID=12399 DF PROTO=UDP SPT=22153 DPT=5060 LEN=398 Oct 17 21:53:43 mail kernel: [1055265.648997] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=185.53.88.127 DST=77.73.69.240 LEN=418 TOS=0x00 PREC=0x00 TTL=55 ID=12401 DF PROTO=UDP SPT=22153 DPT=5062 LEN=398 Oct 17 21:53:43 mail kernel: [1055265.649016] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=185.53.88.127 DST=77.73.69.240 LEN=419 TOS=0x00 PREC=0x00 TTL=55 ID=12400 DF PROTO=UDP SPT=22153 DPT=5061 LEN=399 Oct 17 21:53:43 mail kernel: [1055265.649032] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=185.53.88.127 DST=77.73.69.240 LEN=418 TOS=0x00 PREC=0x00 TTL=55 ID=12402 DF PROTO=UDP SPT=22153 DPT=5063 LEN=398 Oct 17 21:53:43 mail kernel: [1055265.649251] [UFW BLOCK] IN=eth0 OUT= MAC=00:16 |
2019-10-18 04:11:19 |
| 170.254.205.200 | attack | Autoban 170.254.205.200 AUTH/CONNECT |
2019-10-18 04:13:52 |
| 154.92.23.5 | attack | Oct 15 22:22:21 finn sshd[7394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.23.5 user=r.r Oct 15 22:22:23 finn sshd[7394]: Failed password for r.r from 154.92.23.5 port 56314 ssh2 Oct 15 22:22:23 finn sshd[7394]: Received disconnect from 154.92.23.5 port 56314:11: Bye Bye [preauth] Oct 15 22:22:23 finn sshd[7394]: Disconnected from 154.92.23.5 port 56314 [preauth] Oct 15 22:35:14 finn sshd[9807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.23.5 user=r.r Oct 15 22:35:16 finn sshd[9807]: Failed password for r.r from 154.92.23.5 port 58356 ssh2 Oct 15 22:35:16 finn sshd[9807]: Received disconnect from 154.92.23.5 port 58356:11: Bye Bye [preauth] Oct 15 22:35:16 finn sshd[9807]: Disconnected from 154.92.23.5 port 58356 [preauth] Oct 15 22:40:25 finn sshd[11297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.23.5 user=r.r ........ ------------------------------- |
2019-10-18 04:04:09 |
| 91.121.211.34 | attack | Oct 17 20:04:26 web8 sshd\[8647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34 user=root Oct 17 20:04:28 web8 sshd\[8647\]: Failed password for root from 91.121.211.34 port 60330 ssh2 Oct 17 20:08:08 web8 sshd\[10408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34 user=root Oct 17 20:08:10 web8 sshd\[10408\]: Failed password for root from 91.121.211.34 port 43480 ssh2 Oct 17 20:11:49 web8 sshd\[12274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34 user=root |
2019-10-18 04:19:21 |
| 160.153.147.155 | attack | notenfalter.de 160.153.147.155 \[17/Oct/2019:17:41:57 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4335 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/60.0.3112.113 Safari/537.36" NOTENFALTER.DE 160.153.147.155 \[17/Oct/2019:17:41:57 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4335 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/60.0.3112.113 Safari/537.36" |
2019-10-18 03:55:42 |
| 49.247.213.143 | attackspam | Oct 17 21:53:30 ns37 sshd[19132]: Failed password for root from 49.247.213.143 port 34160 ssh2 Oct 17 21:53:30 ns37 sshd[19132]: Failed password for root from 49.247.213.143 port 34160 ssh2 |
2019-10-18 04:24:18 |
| 104.244.79.146 | attackspambots | Oct 17 22:11:59 host sshd[51325]: Invalid user fake from 104.244.79.146 port 53974 Oct 17 22:11:59 host sshd[51325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.146 Oct 17 22:11:59 host sshd[51325]: Invalid user fake from 104.244.79.146 port 53974 Oct 17 22:12:02 host sshd[51325]: Failed password for invalid user fake from 104.244.79.146 port 53974 ssh2 Oct 17 22:12:02 host sshd[51390]: Invalid user admin from 104.244.79.146 port 57694 ... |
2019-10-18 04:23:34 |
| 143.192.97.178 | attackbots | Oct 17 22:16:50 localhost sshd\[11092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.192.97.178 user=root Oct 17 22:16:52 localhost sshd\[11092\]: Failed password for root from 143.192.97.178 port 43497 ssh2 Oct 17 22:20:46 localhost sshd\[11467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.192.97.178 user=root |
2019-10-18 04:21:22 |
| 212.156.115.58 | attack | 2019-10-17T19:53:33.978346abusebot-2.cloudsearch.cf sshd\[16722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.115.58 user=root |
2019-10-18 04:20:42 |
| 176.189.191.64 | attackbots | ENG,WP GET /wp-login.php |
2019-10-18 03:59:15 |
| 106.52.169.18 | attackbots | Oct 18 01:27:39 areeb-Workstation sshd[25964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.169.18 Oct 18 01:27:41 areeb-Workstation sshd[25964]: Failed password for invalid user sudo from 106.52.169.18 port 56306 ssh2 ... |
2019-10-18 04:20:30 |
| 201.6.122.167 | attackspam | Dec 30 05:35:54 odroid64 sshd\[29844\]: Invalid user ubuntu from 201.6.122.167 Dec 30 05:35:54 odroid64 sshd\[29844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.122.167 Dec 30 05:35:56 odroid64 sshd\[29844\]: Failed password for invalid user ubuntu from 201.6.122.167 port 56001 ssh2 Jan 16 12:12:57 odroid64 sshd\[20138\]: Invalid user admin from 201.6.122.167 Jan 16 12:12:57 odroid64 sshd\[20138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.122.167 Jan 16 12:12:59 odroid64 sshd\[20138\]: Failed password for invalid user admin from 201.6.122.167 port 41409 ssh2 Feb 22 13:12:17 odroid64 sshd\[26934\]: Invalid user odoo from 201.6.122.167 Feb 22 13:12:17 odroid64 sshd\[26934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.122.167 Feb 22 13:12:18 odroid64 sshd\[26934\]: Failed password for invalid user odoo from 201.6.122.167 port ... |
2019-10-18 04:18:53 |
| 201.55.126.57 | attackspambots | Oct 12 04:14:44 odroid64 sshd\[31294\]: User root from 201.55.126.57 not allowed because not listed in AllowUsers Oct 12 04:14:44 odroid64 sshd\[31294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.126.57 user=root Oct 12 04:14:46 odroid64 sshd\[31294\]: Failed password for invalid user root from 201.55.126.57 port 38314 ssh2 ... |
2019-10-18 04:20:06 |