城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.99.20.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60301
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.99.20.81. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019042901 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 30 11:48:55 +08 2019
;; MSG SIZE rcvd: 116
Host 81.20.99.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 81.20.99.114.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
119.97.164.246 | attack | SSH login attempts. |
2020-04-25 19:13:03 |
138.197.147.128 | attack | 2020-04-25 11:56:47,000 fail2ban.actions: WARNING [ssh] Ban 138.197.147.128 |
2020-04-25 19:34:10 |
213.6.8.38 | attackbotsspam | (sshd) Failed SSH login from 213.6.8.38 (PS/Palestine/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 25 13:05:14 amsweb01 sshd[20134]: Invalid user testftp from 213.6.8.38 port 49809 Apr 25 13:05:16 amsweb01 sshd[20134]: Failed password for invalid user testftp from 213.6.8.38 port 49809 ssh2 Apr 25 13:17:39 amsweb01 sshd[21488]: Invalid user topgres from 213.6.8.38 port 49181 Apr 25 13:17:40 amsweb01 sshd[21488]: Failed password for invalid user topgres from 213.6.8.38 port 49181 ssh2 Apr 25 13:21:50 amsweb01 sshd[21924]: Invalid user Hannu from 213.6.8.38 port 54939 |
2020-04-25 19:38:18 |
111.207.207.97 | attackbotsspam | Web application attack detected by fail2ban |
2020-04-25 19:44:17 |
162.12.217.214 | attackbots | Apr 25 12:23:24 rotator sshd\[2325\]: Invalid user psybnc from 162.12.217.214Apr 25 12:23:26 rotator sshd\[2325\]: Failed password for invalid user psybnc from 162.12.217.214 port 43288 ssh2Apr 25 12:28:01 rotator sshd\[3191\]: Invalid user gpadmin from 162.12.217.214Apr 25 12:28:03 rotator sshd\[3191\]: Failed password for invalid user gpadmin from 162.12.217.214 port 60400 ssh2Apr 25 12:32:02 rotator sshd\[4055\]: Invalid user rail from 162.12.217.214Apr 25 12:32:03 rotator sshd\[4055\]: Failed password for invalid user rail from 162.12.217.214 port 42122 ssh2 ... |
2020-04-25 19:40:10 |
40.132.4.75 | attackspam | Apr 25 13:00:31 server sshd[20953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.132.4.75 Apr 25 13:00:33 server sshd[20953]: Failed password for invalid user ftp from 40.132.4.75 port 39204 ssh2 Apr 25 13:02:29 server sshd[21129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.132.4.75 ... |
2020-04-25 19:20:14 |
49.235.206.148 | attackspam | Apr 25 11:48:10 nextcloud sshd\[31301\]: Invalid user vz from 49.235.206.148 Apr 25 11:48:10 nextcloud sshd\[31301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.206.148 Apr 25 11:48:12 nextcloud sshd\[31301\]: Failed password for invalid user vz from 49.235.206.148 port 50294 ssh2 |
2020-04-25 19:30:48 |
150.95.181.49 | attackspam | Apr 25 11:42:16 sshgateway sshd\[1627\]: Invalid user phion from 150.95.181.49 Apr 25 11:42:16 sshgateway sshd\[1627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-181-49.a0e3.g.tyo1.static.cnode.io Apr 25 11:42:19 sshgateway sshd\[1627\]: Failed password for invalid user phion from 150.95.181.49 port 59546 ssh2 |
2020-04-25 19:48:02 |
116.236.109.90 | attackbotsspam | Apr 25 12:19:14 *host* sshd\[10302\]: Unable to negotiate with 116.236.109.90 port 45799: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\] |
2020-04-25 19:49:36 |
122.51.34.199 | attack | $f2bV_matches |
2020-04-25 19:46:59 |
185.58.226.235 | attackbotsspam | Apr 25 12:54:09 ns381471 sshd[27947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.58.226.235 Apr 25 12:54:11 ns381471 sshd[27947]: Failed password for invalid user vero from 185.58.226.235 port 46184 ssh2 |
2020-04-25 19:14:26 |
157.230.2.208 | attack | prod8 ... |
2020-04-25 19:16:52 |
51.15.129.164 | attackspambots | Apr 25 10:34:28 sso sshd[31354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.129.164 Apr 25 10:34:30 sso sshd[31354]: Failed password for invalid user tft from 51.15.129.164 port 37868 ssh2 ... |
2020-04-25 19:21:18 |
107.170.37.74 | attackbots | Apr 25 11:11:05 sigma sshd\[8308\]: Invalid user gmodserver1 from 107.170.37.74Apr 25 11:11:08 sigma sshd\[8308\]: Failed password for invalid user gmodserver1 from 107.170.37.74 port 60228 ssh2 ... |
2020-04-25 19:41:15 |
189.197.60.78 | attackbotsspam | TCP port 3389: Scan and connection |
2020-04-25 19:35:11 |