城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.114.221.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.114.221.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025033101 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 08:30:17 CST 2025
;; MSG SIZE rcvd: 107
Host 20.221.114.107.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.221.114.107.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 216.126.239.38 | attackbots | Jun 30 05:36:12 ws22vmsma01 sshd[197034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.239.38 Jun 30 05:36:14 ws22vmsma01 sshd[197034]: Failed password for invalid user albert from 216.126.239.38 port 47924 ssh2 ... |
2020-06-30 17:38:52 |
| 45.58.138.178 | attackbotsspam |
|
2020-06-30 17:08:53 |
| 39.59.68.96 | attackbotsspam | IP 39.59.68.96 attacked honeypot on port: 8080 at 6/29/2020 8:50:48 PM |
2020-06-30 17:21:29 |
| 58.102.31.36 | attackspambots | Jun 29 21:24:53 mockhub sshd[29008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.102.31.36 Jun 29 21:24:55 mockhub sshd[29008]: Failed password for invalid user ernest from 58.102.31.36 port 60060 ssh2 ... |
2020-06-30 17:43:22 |
| 163.172.145.149 | attackspambots | Jun 30 18:57:37 web1 sshd[7700]: Invalid user mailman from 163.172.145.149 port 51560 Jun 30 18:57:37 web1 sshd[7700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.145.149 Jun 30 18:57:37 web1 sshd[7700]: Invalid user mailman from 163.172.145.149 port 51560 Jun 30 18:57:40 web1 sshd[7700]: Failed password for invalid user mailman from 163.172.145.149 port 51560 ssh2 Jun 30 19:05:40 web1 sshd[9709]: Invalid user sq from 163.172.145.149 port 42086 Jun 30 19:05:40 web1 sshd[9709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.145.149 Jun 30 19:05:40 web1 sshd[9709]: Invalid user sq from 163.172.145.149 port 42086 Jun 30 19:05:41 web1 sshd[9709]: Failed password for invalid user sq from 163.172.145.149 port 42086 ssh2 Jun 30 19:08:52 web1 sshd[10724]: Invalid user mc from 163.172.145.149 port 42120 ... |
2020-06-30 17:27:57 |
| 106.13.10.242 | attackbotsspam | Jun 30 07:54:30 meumeu sshd[143091]: Invalid user ash from 106.13.10.242 port 43512 Jun 30 07:54:30 meumeu sshd[143091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.10.242 Jun 30 07:54:30 meumeu sshd[143091]: Invalid user ash from 106.13.10.242 port 43512 Jun 30 07:54:33 meumeu sshd[143091]: Failed password for invalid user ash from 106.13.10.242 port 43512 ssh2 Jun 30 07:56:03 meumeu sshd[143136]: Invalid user servicedesk from 106.13.10.242 port 33530 Jun 30 07:56:03 meumeu sshd[143136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.10.242 Jun 30 07:56:03 meumeu sshd[143136]: Invalid user servicedesk from 106.13.10.242 port 33530 Jun 30 07:56:05 meumeu sshd[143136]: Failed password for invalid user servicedesk from 106.13.10.242 port 33530 ssh2 Jun 30 07:57:35 meumeu sshd[143177]: Invalid user amsftp from 106.13.10.242 port 51772 ... |
2020-06-30 17:42:32 |
| 112.85.42.89 | attackspam | Jun 30 09:19:22 plex-server sshd[163058]: Failed password for root from 112.85.42.89 port 52811 ssh2 Jun 30 09:19:26 plex-server sshd[163058]: Failed password for root from 112.85.42.89 port 52811 ssh2 Jun 30 09:19:30 plex-server sshd[163058]: Failed password for root from 112.85.42.89 port 52811 ssh2 Jun 30 09:20:11 plex-server sshd[163082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root Jun 30 09:20:13 plex-server sshd[163082]: Failed password for root from 112.85.42.89 port 18140 ssh2 ... |
2020-06-30 17:36:55 |
| 27.255.77.5 | attackbotsspam | Unauthorized SSH login attempts |
2020-06-30 17:17:55 |
| 134.175.19.39 | attackspam | Invalid user alvaro from 134.175.19.39 port 46470 |
2020-06-30 17:36:03 |
| 121.7.127.92 | attackbots | Jun 30 09:01:56 lnxded63 sshd[31306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.127.92 |
2020-06-30 17:34:11 |
| 219.251.82.34 | attackbots | Automatic report - Port Scan |
2020-06-30 17:13:44 |
| 103.138.109.68 | attack | ... |
2020-06-30 17:01:34 |
| 123.59.213.68 | attackspam | Invalid user binny from 123.59.213.68 port 55190 |
2020-06-30 16:59:47 |
| 211.43.13.243 | attackspambots | Jun 30 08:32:36 lnxded64 sshd[15629]: Failed password for root from 211.43.13.243 port 43914 ssh2 Jun 30 08:34:18 lnxded64 sshd[15976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.43.13.243 Jun 30 08:34:20 lnxded64 sshd[15976]: Failed password for invalid user administrator from 211.43.13.243 port 35076 ssh2 |
2020-06-30 17:27:27 |
| 46.38.150.132 | attackspam | Jun 30 11:17:45 srv01 postfix/smtpd\[12303\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 30 11:18:31 srv01 postfix/smtpd\[12303\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 30 11:19:14 srv01 postfix/smtpd\[13254\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 30 11:19:58 srv01 postfix/smtpd\[5843\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 30 11:20:04 srv01 postfix/smtpd\[12303\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-30 17:20:57 |