城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.216.53.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;131.216.53.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 16:51:04 CST 2025
;; MSG SIZE rcvd: 107
104.53.216.131.in-addr.arpa domain name pointer u-131-216-53-104.dhcp.unlv.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.53.216.131.in-addr.arpa name = u-131-216-53-104.dhcp.unlv.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.180.142 | attack | 2020-08-17T23:22:22.091754vps1033 sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142 user=root 2020-08-17T23:22:23.913372vps1033 sshd[16926]: Failed password for root from 222.186.180.142 port 24325 ssh2 2020-08-17T23:22:22.091754vps1033 sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142 user=root 2020-08-17T23:22:23.913372vps1033 sshd[16926]: Failed password for root from 222.186.180.142 port 24325 ssh2 2020-08-17T23:22:26.301264vps1033 sshd[16926]: Failed password for root from 222.186.180.142 port 24325 ssh2 ... |
2020-08-18 07:25:23 |
| 2.139.220.30 | attackbots | Aug 17 21:39:14 ip-172-31-16-56 sshd\[10242\]: Invalid user lxr from 2.139.220.30\ Aug 17 21:39:16 ip-172-31-16-56 sshd\[10242\]: Failed password for invalid user lxr from 2.139.220.30 port 59304 ssh2\ Aug 17 21:42:14 ip-172-31-16-56 sshd\[10293\]: Invalid user admin from 2.139.220.30\ Aug 17 21:42:16 ip-172-31-16-56 sshd\[10293\]: Failed password for invalid user admin from 2.139.220.30 port 54398 ssh2\ Aug 17 21:45:18 ip-172-31-16-56 sshd\[10342\]: Invalid user rails from 2.139.220.30\ |
2020-08-18 07:39:35 |
| 212.70.149.83 | attackbots | Aug 18 00:37:14 blackbee postfix/smtpd[10252]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure Aug 18 00:37:43 blackbee postfix/smtpd[10252]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure Aug 18 00:38:13 blackbee postfix/smtpd[10252]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure Aug 18 00:38:42 blackbee postfix/smtpd[10252]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure Aug 18 00:39:11 blackbee postfix/smtpd[10252]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure ... |
2020-08-18 07:47:39 |
| 193.56.28.144 | attackspambots | Aug 18 00:56:03 galaxy event: galaxy/lswi: smtp: mysql@uni-potsdam.de [193.56.28.144] authentication failure using internet password Aug 18 00:56:04 galaxy event: galaxy/lswi: smtp: mysql@uni-potsdam.de [193.56.28.144] authentication failure using internet password Aug 18 00:56:04 galaxy event: galaxy/lswi: smtp: mysql@uni-potsdam.de [193.56.28.144] authentication failure using internet password Aug 18 00:56:04 galaxy event: galaxy/lswi: smtp: mysql@uni-potsdam.de [193.56.28.144] authentication failure using internet password Aug 18 00:56:04 galaxy event: galaxy/lswi: smtp: mysql@uni-potsdam.de [193.56.28.144] authentication failure using internet password ... |
2020-08-18 07:25:38 |
| 81.68.68.231 | attackspambots | Fail2Ban |
2020-08-18 07:52:10 |
| 94.243.219.122 | attackspam | 2020-08-17T22:24:22+02:00 |
2020-08-18 07:31:47 |
| 119.123.226.119 | attackbots | Aug 17 14:50:56 our-server-hostname sshd[19057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.226.119 user=r.r Aug 17 14:50:58 our-server-hostname sshd[19057]: Failed password for r.r from 119.123.226.119 port 2260 ssh2 Aug 17 15:03:00 our-server-hostname sshd[21103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.226.119 user=r.r Aug 17 15:03:02 our-server-hostname sshd[21103]: Failed password for r.r from 119.123.226.119 port 2262 ssh2 Aug 17 15:06:01 our-server-hostname sshd[21685]: Invalid user sonarUser from 119.123.226.119 Aug 17 15:06:01 our-server-hostname sshd[21685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.226.119 Aug 17 15:06:03 our-server-hostname sshd[21685]: Failed password for invalid user sonarUser from 119.123.226.119 port 2263 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=119.1 |
2020-08-18 07:45:01 |
| 13.90.140.245 | attack | $f2bV_matches |
2020-08-18 08:02:36 |
| 77.255.211.62 | attackbotsspam | (sshd) Failed SSH login from 77.255.211.62 (PL/Poland/77-255-211-62.adsl.inetia.pl): 5 in the last 3600 secs |
2020-08-18 07:49:20 |
| 159.65.163.59 | attack | SSH |
2020-08-18 08:01:25 |
| 192.141.80.72 | attackspambots | Aug 17 16:24:46 logopedia-1vcpu-1gb-nyc1-01 sshd[430044]: Failed password for root from 192.141.80.72 port 46068 ssh2 ... |
2020-08-18 07:46:25 |
| 125.124.254.31 | attackbotsspam | frenzy |
2020-08-18 07:40:43 |
| 211.159.218.251 | attackbotsspam | 2020-08-17T21:01:27.515982shield sshd\[8139\]: Invalid user sftp from 211.159.218.251 port 46506 2020-08-17T21:01:27.524216shield sshd\[8139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.218.251 2020-08-17T21:01:28.955102shield sshd\[8139\]: Failed password for invalid user sftp from 211.159.218.251 port 46506 ssh2 2020-08-17T21:03:35.902463shield sshd\[8638\]: Invalid user etm from 211.159.218.251 port 51118 2020-08-17T21:03:35.910789shield sshd\[8638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.218.251 |
2020-08-18 07:59:57 |
| 152.32.106.72 | attackspambots | 152.32.106.72 - [18/Aug/2020:01:49:50 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" 152.32.106.72 - [18/Aug/2020:01:58:20 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" ... |
2020-08-18 07:50:13 |
| 184.22.172.168 | attackspam | 1597695908 - 08/17/2020 22:25:08 Host: 184.22.172.168/184.22.172.168 Port: 445 TCP Blocked ... |
2020-08-18 07:28:07 |