城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.19.244.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.19.244.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:41:13 CST 2025
;; MSG SIZE rcvd: 106
Host 21.244.19.207.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.244.19.207.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.144.47.29 | attack | scans 50 times in preceeding hours on the ports (in chronological order) 4450 4451 4452 4453 4454 4455 4456 4457 4458 4459 4460 4461 4462 4463 4464 4465 4466 4467 4468 4469 4470 4471 4472 4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497 4498 4499 |
2020-07-27 22:51:26 |
| 94.130.16.67 | attackbotsspam | Phishing, Spam |
2020-07-27 22:33:36 |
| 140.246.182.127 | attack | srv02 Mass scanning activity detected Target: 4710 .. |
2020-07-27 22:23:28 |
| 117.221.45.16 | attackbotsspam | 1595850859 - 07/27/2020 13:54:19 Host: 117.221.45.16/117.221.45.16 Port: 445 TCP Blocked |
2020-07-27 22:59:11 |
| 200.6.188.38 | attackbots | Jul 27 07:07:37 s158375 sshd[3158]: Failed password for invalid user amavis from 200.6.188.38 port 36546 ssh2 |
2020-07-27 22:28:18 |
| 84.33.106.0 | attackbotsspam | Automatic report - Banned IP Access |
2020-07-27 22:51:59 |
| 112.85.42.232 | attackbots | Jul 27 16:37:38 home sshd[1107867]: Failed password for root from 112.85.42.232 port 30235 ssh2 Jul 27 16:38:38 home sshd[1108214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232 user=root Jul 27 16:38:39 home sshd[1108214]: Failed password for root from 112.85.42.232 port 15012 ssh2 Jul 27 16:39:48 home sshd[1108821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232 user=root Jul 27 16:39:50 home sshd[1108821]: Failed password for root from 112.85.42.232 port 63542 ssh2 ... |
2020-07-27 22:41:46 |
| 106.54.3.250 | attackbotsspam | Jul 27 16:08:59 * sshd[4608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.3.250 Jul 27 16:09:01 * sshd[4608]: Failed password for invalid user hph from 106.54.3.250 port 58026 ssh2 |
2020-07-27 22:57:06 |
| 87.103.120.250 | attackspam | ... |
2020-07-27 23:03:45 |
| 31.155.101.198 | attackbots | 1595850865 - 07/27/2020 13:54:25 Host: 31.155.101.198/31.155.101.198 Port: 445 TCP Blocked |
2020-07-27 22:56:49 |
| 111.92.189.45 | attackspambots | Jul 27 15:20:06 b-vps wordpress(gpfans.cz)[6706]: Authentication attempt for unknown user buchtic from 111.92.189.45 ... |
2020-07-27 22:46:25 |
| 40.113.124.250 | attackbots | 40.113.124.250 - - [27/Jul/2020:15:17:02 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 40.113.124.250 - - [27/Jul/2020:15:17:03 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 40.113.124.250 - - [27/Jul/2020:15:17:04 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-07-27 22:27:16 |
| 157.230.132.100 | attack | Jul 27 19:41:40 gw1 sshd[10463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.132.100 Jul 27 19:41:42 gw1 sshd[10463]: Failed password for invalid user kbkim from 157.230.132.100 port 42164 ssh2 ... |
2020-07-27 22:59:34 |
| 45.145.185.25 | attack | 45.145.185.25 - - [27/Jul/2020:18:40:46 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-07-27 22:50:21 |
| 138.68.226.175 | attackbotsspam | 2020-07-27T15:54:46.471592n23.at sshd[997057]: Invalid user yangyi from 138.68.226.175 port 39192 2020-07-27T15:54:48.151642n23.at sshd[997057]: Failed password for invalid user yangyi from 138.68.226.175 port 39192 ssh2 2020-07-27T15:56:27.341925n23.at sshd[998570]: Invalid user koike from 138.68.226.175 port 35512 ... |
2020-07-27 22:39:19 |