城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.93.252.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.93.252.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 23:53:20 CST 2025
;; MSG SIZE rcvd: 107
103.252.93.121.in-addr.arpa domain name pointer ntkyto133007.kyto.nt.ftth.ppp.infoweb.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
103.252.93.121.in-addr.arpa name = ntkyto133007.kyto.nt.ftth.ppp.infoweb.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.160.113.203 | attack | Unauthorized connection attempt from IP address 41.160.113.203 on Port 445(SMB) |
2020-03-03 06:47:21 |
| 221.2.158.54 | attackspam | Mar 2 23:02:24 |
2020-03-03 06:18:22 |
| 27.3.193.25 | attack | Unauthorized connection attempt from IP address 27.3.193.25 on Port 445(SMB) |
2020-03-03 06:30:25 |
| 46.29.163.22 | attackbots | 2020-03-02T22:41:04.850016vps773228.ovh.net sshd[22163]: Invalid user mark from 46.29.163.22 port 41174 2020-03-02T22:41:04.861191vps773228.ovh.net sshd[22163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.29.163.22 2020-03-02T22:41:04.850016vps773228.ovh.net sshd[22163]: Invalid user mark from 46.29.163.22 port 41174 2020-03-02T22:41:06.791184vps773228.ovh.net sshd[22163]: Failed password for invalid user mark from 46.29.163.22 port 41174 ssh2 2020-03-02T22:51:34.948628vps773228.ovh.net sshd[22282]: Invalid user konglh from 46.29.163.22 port 49092 2020-03-02T22:51:34.968118vps773228.ovh.net sshd[22282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.29.163.22 2020-03-02T22:51:34.948628vps773228.ovh.net sshd[22282]: Invalid user konglh from 46.29.163.22 port 49092 2020-03-02T22:51:37.053541vps773228.ovh.net sshd[22282]: Failed password for invalid user konglh from 46.29.163.22 port 49092 ssh2 2020 ... |
2020-03-03 06:40:30 |
| 54.37.66.73 | attackspam | Mar 2 12:18:08 hanapaa sshd\[12229\]: Invalid user daniel from 54.37.66.73 Mar 2 12:18:08 hanapaa sshd\[12229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-54-37-66.eu Mar 2 12:18:10 hanapaa sshd\[12229\]: Failed password for invalid user daniel from 54.37.66.73 port 57668 ssh2 Mar 2 12:25:54 hanapaa sshd\[12846\]: Invalid user test2 from 54.37.66.73 Mar 2 12:25:54 hanapaa sshd\[12846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-54-37-66.eu |
2020-03-03 06:29:59 |
| 88.230.105.200 | attackbots | Lines containing failures of 88.230.105.200 Mar 2 22:44:41 shared11 sshd[17405]: Invalid user Admin2 from 88.230.105.200 port 58285 Mar 2 22:44:42 shared11 sshd[17405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.230.105.200 Mar 2 22:44:44 shared11 sshd[17405]: Failed password for invalid user Admin2 from 88.230.105.200 port 58285 ssh2 Mar 2 22:44:44 shared11 sshd[17405]: Connection closed by invalid user Admin2 88.230.105.200 port 58285 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=88.230.105.200 |
2020-03-03 06:49:04 |
| 185.202.1.164 | attack | Mar 2 23:13:51 ns3042688 sshd\[26703\]: Invalid user openvpn from 185.202.1.164 Mar 2 23:13:51 ns3042688 sshd\[26703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.1.164 Mar 2 23:13:52 ns3042688 sshd\[26703\]: Failed password for invalid user openvpn from 185.202.1.164 port 42476 ssh2 Mar 2 23:13:53 ns3042688 sshd\[26708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.1.164 user=mysql Mar 2 23:13:55 ns3042688 sshd\[26708\]: Failed password for mysql from 185.202.1.164 port 44263 ssh2 ... |
2020-03-03 06:39:17 |
| 190.206.183.41 | attackbotsspam | Unauthorized connection attempt from IP address 190.206.183.41 on Port 445(SMB) |
2020-03-03 06:36:39 |
| 125.162.164.129 | attackbots | 1583186538 - 03/02/2020 23:02:18 Host: 125.162.164.129/125.162.164.129 Port: 445 TCP Blocked |
2020-03-03 06:25:39 |
| 217.234.95.252 | attackbots | Mar 2 20:49:41 mx01 sshd[15119]: Connection closed by 217.234.95.252 [preauth] Mar 2 20:50:14 mx01 sshd[15121]: Invalid user cpaneleximscanner from 217.234.95.252 Mar 2 20:50:16 mx01 sshd[15121]: Failed password for invalid user cpaneleximscanner from 217.234.95.252 port 40822 ssh2 Mar 2 20:50:16 mx01 sshd[15121]: Received disconnect from 217.234.95.252: 11: Bye Bye [preauth] Mar 2 21:30:09 mx01 sshd[20205]: Failed password for gnats from 217.234.95.252 port 50932 ssh2 Mar 2 21:30:09 mx01 sshd[20205]: Received disconnect from 217.234.95.252: 11: Bye Bye [preauth] Mar 2 21:33:56 mx01 sshd[20751]: Failed password for r.r from 217.234.95.252 port 45198 ssh2 Mar 2 21:33:57 mx01 sshd[20751]: Received disconnect from 217.234.95.252: 11: Bye Bye [preauth] Mar 2 21:34:51 mx01 sshd[20865]: Invalid user user from 217.234.95.252 Mar 2 21:34:53 mx01 sshd[20865]: Failed password for invalid user user from 217.234.95.252 port 51432 ssh2 Mar 2 21:34:53 mx01 sshd[20865]: Rec........ ------------------------------- |
2020-03-03 06:31:19 |
| 104.248.181.156 | attack | Mar 2 23:18:26 srv01 sshd[30777]: Invalid user ftpuser from 104.248.181.156 port 37808 Mar 2 23:18:26 srv01 sshd[30777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.181.156 Mar 2 23:18:26 srv01 sshd[30777]: Invalid user ftpuser from 104.248.181.156 port 37808 Mar 2 23:18:28 srv01 sshd[30777]: Failed password for invalid user ftpuser from 104.248.181.156 port 37808 ssh2 Mar 2 23:22:00 srv01 sshd[31109]: Invalid user ftpuser from 104.248.181.156 port 35586 ... |
2020-03-03 06:46:57 |
| 180.76.248.85 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-03-03 06:35:32 |
| 69.194.68.114 | attack | Unauthorized connection attempt from IP address 69.194.68.114 on Port 445(SMB) |
2020-03-03 06:56:48 |
| 39.106.159.75 | attackspam | Banned by Fail2Ban ... |
2020-03-03 06:37:38 |
| 220.164.2.118 | attack | Brute force attempt |
2020-03-03 06:27:46 |