城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 127.104.97.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;127.104.97.33. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:30:05 CST 2025
;; MSG SIZE rcvd: 106
Host 33.97.104.127.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 33.97.104.127.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.199.165.114 | attackspam | 2020-04-01T21:38:15.886028shield sshd\[13044\]: Invalid user sphinx from 128.199.165.114 port 58598 2020-04-01T21:38:15.889660shield sshd\[13044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.165.114 2020-04-01T21:38:18.074066shield sshd\[13044\]: Failed password for invalid user sphinx from 128.199.165.114 port 58598 ssh2 2020-04-01T21:40:54.121002shield sshd\[13650\]: Invalid user sphinx from 128.199.165.114 port 58188 2020-04-01T21:40:54.126598shield sshd\[13650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.165.114 |
2020-04-02 05:53:12 |
| 159.89.163.226 | attackbots | Apr 1 23:13:02 sso sshd[14679]: Failed password for root from 159.89.163.226 port 59938 ssh2 ... |
2020-04-02 05:52:42 |
| 107.170.204.148 | attack | 2020-04-01T21:10:19.242153shield sshd\[4598\]: Invalid user ziyuan from 107.170.204.148 port 50428 2020-04-01T21:10:19.246804shield sshd\[4598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148 2020-04-01T21:10:21.014577shield sshd\[4598\]: Failed password for invalid user ziyuan from 107.170.204.148 port 50428 ssh2 2020-04-01T21:15:26.606935shield sshd\[6119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.204.148 user=root 2020-04-01T21:15:28.520273shield sshd\[6119\]: Failed password for root from 107.170.204.148 port 33712 ssh2 |
2020-04-02 05:55:36 |
| 100.18.35.15 | attack | 400 BAD REQUEST |
2020-04-02 06:14:17 |
| 222.186.180.41 | attackspambots | 2020-04-01T21:35:30.947824homeassistant sshd[25210]: Failed none for root from 222.186.180.41 port 33798 ssh2 2020-04-01T21:35:31.151763homeassistant sshd[25210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41 user=root ... |
2020-04-02 05:39:39 |
| 77.42.97.163 | attackspam | Automatic report - Port Scan Attack |
2020-04-02 05:59:10 |
| 132.148.83.124 | attack | .htaccess pcfg_openfile |
2020-04-02 05:56:46 |
| 42.123.77.214 | attack | Apr 1 23:15:47 h2779839 sshd[21535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.77.214 user=root Apr 1 23:15:48 h2779839 sshd[21535]: Failed password for root from 42.123.77.214 port 53837 ssh2 Apr 1 23:19:20 h2779839 sshd[21572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.77.214 user=root Apr 1 23:19:22 h2779839 sshd[21572]: Failed password for root from 42.123.77.214 port 45402 ssh2 Apr 1 23:22:29 h2779839 sshd[21639]: Invalid user ve from 42.123.77.214 port 36976 Apr 1 23:22:29 h2779839 sshd[21639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.77.214 Apr 1 23:22:29 h2779839 sshd[21639]: Invalid user ve from 42.123.77.214 port 36976 Apr 1 23:22:30 h2779839 sshd[21639]: Failed password for invalid user ve from 42.123.77.214 port 36976 ssh2 Apr 1 23:25:29 h2779839 sshd[21695]: pam_unix(sshd:auth): authentication failure; lo ... |
2020-04-02 05:44:45 |
| 95.167.39.12 | attackbots | $f2bV_matches |
2020-04-02 06:07:21 |
| 111.42.102.127 | attackspambots | GPON Home Routers Remote Code Execution Vulnerability |
2020-04-02 05:51:06 |
| 139.198.5.79 | attackspambots | Apr 1 23:52:44 vps sshd[862120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79 user=root Apr 1 23:52:45 vps sshd[862120]: Failed password for root from 139.198.5.79 port 47436 ssh2 Apr 1 23:56:25 vps sshd[882443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79 user=root Apr 1 23:56:27 vps sshd[882443]: Failed password for root from 139.198.5.79 port 41440 ssh2 Apr 2 00:00:10 vps sshd[904074]: Invalid user user2 from 139.198.5.79 port 35422 ... |
2020-04-02 06:12:09 |
| 45.14.150.133 | attack | Invalid user kpy from 45.14.150.133 port 51074 |
2020-04-02 06:02:09 |
| 60.251.136.161 | attackspambots | Brute-force attempt banned |
2020-04-02 05:44:29 |
| 188.162.43.98 | attack | $f2bV_matches |
2020-04-02 05:43:51 |
| 159.65.41.159 | attackbotsspam | SSH invalid-user multiple login attempts |
2020-04-02 05:41:23 |