城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.101.21.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.101.21.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 23:05:32 CST 2025
;; MSG SIZE rcvd: 107
Host 169.21.101.194.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 169.21.101.194.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 186.67.137.90 | attack | Jul 29 14:36:48 arianus sshd\[2630\]: Invalid user support from 186.67.137.90 port 47472 ... |
2019-07-29 20:42:49 |
| 138.68.59.188 | attackspambots | Automatic report - Banned IP Access |
2019-07-29 21:02:02 |
| 185.143.221.58 | attack | Jul 29 14:30:34 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.58 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17998 PROTO=TCP SPT=54017 DPT=12799 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-07-29 21:14:36 |
| 14.241.120.92 | attackbotsspam | Unauthorised access (Jul 29) SRC=14.241.120.92 LEN=52 TTL=118 ID=20907 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-29 20:48:00 |
| 43.243.127.89 | attackspam | DATE:2019-07-29 08:43:51, IP:43.243.127.89, PORT:ssh brute force auth on SSH service (patata) |
2019-07-29 21:11:53 |
| 69.30.198.242 | attack | Automatic report - Banned IP Access |
2019-07-29 20:57:34 |
| 54.37.136.183 | attack | Jul 29 13:10:44 [munged] sshd[30178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.183 user=root Jul 29 13:10:45 [munged] sshd[30178]: Failed password for root from 54.37.136.183 port 51882 ssh2 |
2019-07-29 20:48:43 |
| 45.40.199.54 | attack | Jul 29 08:00:17 uapps sshd[20874]: User r.r from 45.40.199.54 not allowed because not listed in AllowUsers Jul 29 08:00:18 uapps sshd[20874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.54 user=r.r Jul 29 08:00:20 uapps sshd[20874]: Failed password for invalid user r.r from 45.40.199.54 port 53304 ssh2 Jul 29 08:00:20 uapps sshd[20874]: Received disconnect from 45.40.199.54: 11: Bye Bye [preauth] Jul 29 08:28:24 uapps sshd[22850]: User r.r from 45.40.199.54 not allowed because not listed in AllowUsers Jul 29 08:28:24 uapps sshd[22850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.54 user=r.r Jul 29 08:28:26 uapps sshd[22850]: Failed password for invalid user r.r from 45.40.199.54 port 34384 ssh2 Jul 29 08:28:26 uapps sshd[22850]: Received disconnect from 45.40.199.54: 11: Bye Bye [preauth] Jul 29 08:29:53 uapps sshd[22966]: User r.r from 45.40.199.54 not allowed ........ ------------------------------- |
2019-07-29 20:29:14 |
| 113.118.192.165 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-07-29 21:03:28 |
| 165.227.143.37 | attackspambots | Jul 29 15:05:13 meumeu sshd[9843]: Failed password for root from 165.227.143.37 port 58554 ssh2 Jul 29 15:09:40 meumeu sshd[10432]: Failed password for root from 165.227.143.37 port 53350 ssh2 ... |
2019-07-29 21:19:22 |
| 123.209.196.6 | attack | 2019-07-29T10:51:18.071101abusebot.cloudsearch.cf sshd\[2106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.209.196.6 user=root |
2019-07-29 20:46:45 |
| 193.248.148.163 | attackspam | Jul 28 18:52:26 fatman sshd[16132]: Failed password for r.r from 193.248.148.163 port 57058 ssh2 Jul 28 18:52:26 fatman sshd[16132]: Received disconnect from 193.248.148.163: 11: Bye Bye [preauth] Jul 28 20:02:44 fatman sshd[16604]: Failed password for r.r from 193.248.148.163 port 38064 ssh2 Jul 28 20:02:44 fatman sshd[16604]: Received disconnect from 193.248.148.163: 11: Bye Bye [preauth] Jul 28 20:07:10 fatman sshd[16630]: Failed password for r.r from 193.248.148.163 port 35508 ssh2 Jul 28 20:07:10 fatman sshd[16630]: Received disconnect from 193.248.148.163: 11: Bye Bye [preauth] Jul 28 20:11:29 fatman sshd[16664]: Failed password for r.r from 193.248.148.163 port 32948 ssh2 Jul 28 20:11:29 fatman sshd[16664]: Received disconnect from 193.248.148.163: 11: Bye Bye [preauth] Jul 28 20:15:49 fatman sshd[16696]: Failed password for r.r from 193.248.148.163 port 58625 ssh2 Jul 28 20:15:49 fatman sshd[16696]: Received disconnect from 193.248.148.163: 11: Bye Bye [preauth]........ ------------------------------- |
2019-07-29 21:04:02 |
| 58.145.168.162 | attack | 2019-07-29T11:16:42.938238abusebot-4.cloudsearch.cf sshd\[21846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.145.168.162 user=root |
2019-07-29 20:41:14 |
| 194.55.187.3 | attackspambots | Jul 29 12:50:29 MK-Soft-VM4 sshd\[17004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.55.187.3 user=root Jul 29 12:50:31 MK-Soft-VM4 sshd\[17004\]: Failed password for root from 194.55.187.3 port 56100 ssh2 Jul 29 12:50:33 MK-Soft-VM4 sshd\[17036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.55.187.3 user=root ... |
2019-07-29 21:07:27 |
| 125.84.237.254 | attackbots | Jul 29 11:34:05 server6 sshd[22666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.84.237.254 user=r.r Jul 29 11:34:08 server6 sshd[22666]: Failed password for r.r from 125.84.237.254 port 14549 ssh2 Jul 29 11:34:08 server6 sshd[22666]: Received disconnect from 125.84.237.254: 11: Bye Bye [preauth] Jul 29 11:55:20 server6 sshd[12729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.84.237.254 user=r.r Jul 29 11:55:22 server6 sshd[12729]: Failed password for r.r from 125.84.237.254 port 13112 ssh2 Jul 29 11:55:22 server6 sshd[12729]: Received disconnect from 125.84.237.254: 11: Bye Bye [preauth] Jul 29 11:57:10 server6 sshd[13817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.84.237.254 user=r.r Jul 29 11:57:12 server6 sshd[13817]: Failed password for r.r from 125.84.237.254 port 24969 ssh2 Jul 29 11:57:12 server6 sshd[13817]: Receiv........ ------------------------------- |
2019-07-29 20:41:58 |