城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.40.134.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.40.134.84. IN A
;; AUTHORITY SECTION:
. 324 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 23:34:41 CST 2022
;; MSG SIZE rcvd: 106
Host 84.134.40.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 84.134.40.121.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.170.189.7 | attackbotsspam | 2323/tcp 23/tcp... [2020-06-01/07-19]18pkt,2pt.(tcp) |
2020-07-20 06:11:13 |
| 41.93.32.94 | attackbots | Jul 20 00:11:04 OPSO sshd\[3403\]: Invalid user postgres from 41.93.32.94 port 50660 Jul 20 00:11:04 OPSO sshd\[3403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.94 Jul 20 00:11:06 OPSO sshd\[3403\]: Failed password for invalid user postgres from 41.93.32.94 port 50660 ssh2 Jul 20 00:19:13 OPSO sshd\[5453\]: Invalid user xiaoxu from 41.93.32.94 port 33170 Jul 20 00:19:13 OPSO sshd\[5453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.94 |
2020-07-20 06:28:50 |
| 39.100.28.79 | attackspam | Failed password for invalid user zebra from 39.100.28.79 port 39200 ssh2 |
2020-07-20 06:35:45 |
| 71.85.106.211 | attackbotsspam | Jul 18 08:48:42 71.85.106.211 PROTO=TCP SPT=53484 DPT=23 Jul 18 09:52:21 71.85.106.211 PROTO=TCP SPT=60986 DPT=23 Jul 18 11:07:33 71.85.106.211 PROTO=TCP SPT=22294 DPT=23 Jul 18 12:07:07 71.85.106.211 PROTO=TCP SPT=45490 DPT=23 Jul 18 12:57:08 71.85.106.211 PROTO=TCP SPT=64800 DPT=23 Jul 18 13:46:14 71.85.106.211 PROTO=TCP SPT=13533 DPT=23 |
2020-07-20 06:09:54 |
| 140.206.157.242 | attackbotsspam | $f2bV_matches |
2020-07-20 06:36:49 |
| 150.136.5.221 | attackspambots | 2020-07-19T23:21:00+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-07-20 06:07:15 |
| 59.30.198.121 | attackspambots | Unauthorized connection attempt detected from IP address 59.30.198.121 to port 23 |
2020-07-20 06:01:42 |
| 113.193.243.35 | attackspam | Jul 19 23:59:01 havingfunrightnow sshd[21708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35 Jul 19 23:59:04 havingfunrightnow sshd[21708]: Failed password for invalid user test1 from 113.193.243.35 port 58930 ssh2 Jul 20 00:07:24 havingfunrightnow sshd[21973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35 ... |
2020-07-20 06:21:40 |
| 207.5.114.106 | attack | [H1.VM2] Blocked by UFW |
2020-07-20 06:20:47 |
| 13.209.66.137 | attackspam | 13.209.66.137 - - [19/Jul/2020:19:24:39 +0200] "POST /xmlrpc.php HTTP/1.1" 403 8488 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 13.209.66.137 - - [19/Jul/2020:19:39:53 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-20 06:18:52 |
| 37.57.218.243 | attack | 20 attempts against mh-misbehave-ban on sonic |
2020-07-20 06:13:01 |
| 205.185.116.156 | attackbotsspam |
|
2020-07-20 06:27:49 |
| 46.98.128.7 | attack | 0,28-01/01 [bc04/m54] PostRequest-Spammer scoring: Lusaka01 |
2020-07-20 06:06:27 |
| 211.237.27.5 | attackspambots | firewall-block, port(s): 445/tcp |
2020-07-20 06:23:20 |
| 157.245.98.160 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-07-20 06:14:12 |