城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.12.50.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.12.50.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:11:20 CST 2025
;; MSG SIZE rcvd: 104
Host 19.50.12.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 19.50.12.21.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.227.197.27 | attackbotsspam | Invalid user dasusr1 from 124.227.197.27 port 54995 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.227.197.27 Failed password for invalid user dasusr1 from 124.227.197.27 port 54995 ssh2 Invalid user direction from 124.227.197.27 port 35764 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.227.197.27 |
2020-02-24 00:21:29 |
| 118.254.70.204 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-24 00:30:46 |
| 102.176.81.99 | attackspambots | Feb 23 15:58:40 vps647732 sshd[29807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.176.81.99 Feb 23 15:58:42 vps647732 sshd[29807]: Failed password for invalid user yuly from 102.176.81.99 port 35460 ssh2 ... |
2020-02-24 00:42:37 |
| 34.93.239.8 | attackspambots | $f2bV_matches |
2020-02-24 00:14:45 |
| 211.143.54.93 | attack | Brute force blocker - service: proftpd1, proftpd2 - aantal: 155 - Thu Jun 21 06:50:16 2018 |
2020-02-24 00:25:40 |
| 188.36.125.210 | attackbots | Feb 23 16:24:25 v22018076622670303 sshd\[2391\]: Invalid user aman from 188.36.125.210 port 41332 Feb 23 16:24:25 v22018076622670303 sshd\[2391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.36.125.210 Feb 23 16:24:28 v22018076622670303 sshd\[2391\]: Failed password for invalid user aman from 188.36.125.210 port 41332 ssh2 ... |
2020-02-24 00:40:54 |
| 77.94.25.32 | attackbotsspam | 1582464420 - 02/23/2020 14:27:00 Host: 77.94.25.32/77.94.25.32 Port: 445 TCP Blocked |
2020-02-24 00:39:19 |
| 60.177.226.240 | attack | lfd: (smtpauth) Failed SMTP AUTH login from 60.177.226.240 (240.226.177.60.broad.hz.zj.dynamic.163data.com.cn): 5 in the last 3600 secs - Thu Jun 21 03:38:04 2018 |
2020-02-24 00:54:00 |
| 103.76.21.181 | attackbots | Feb 23 06:10:06 php1 sshd\[18510\]: Invalid user xvwei from 103.76.21.181 Feb 23 06:10:06 php1 sshd\[18510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.21.181 Feb 23 06:10:08 php1 sshd\[18510\]: Failed password for invalid user xvwei from 103.76.21.181 port 33284 ssh2 Feb 23 06:13:33 php1 sshd\[18820\]: Invalid user guestuser from 103.76.21.181 Feb 23 06:13:33 php1 sshd\[18820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.21.181 |
2020-02-24 00:20:39 |
| 58.214.195.67 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 58.214.195.67 (-): 5 in the last 3600 secs - Thu Jun 21 08:03:02 2018 |
2020-02-24 00:27:45 |
| 112.85.42.173 | attackbots | Feb 23 17:31:31 eventyay sshd[12433]: Failed password for root from 112.85.42.173 port 12376 ssh2 Feb 23 17:31:44 eventyay sshd[12433]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 12376 ssh2 [preauth] Feb 23 17:31:52 eventyay sshd[12436]: Failed password for root from 112.85.42.173 port 43801 ssh2 ... |
2020-02-24 00:38:21 |
| 112.85.42.172 | attack | Feb 23 18:31:15 ift sshd\[17702\]: Failed password for root from 112.85.42.172 port 63399 ssh2Feb 23 18:31:18 ift sshd\[17702\]: Failed password for root from 112.85.42.172 port 63399 ssh2Feb 23 18:31:22 ift sshd\[17702\]: Failed password for root from 112.85.42.172 port 63399 ssh2Feb 23 18:31:35 ift sshd\[17707\]: Failed password for root from 112.85.42.172 port 28679 ssh2Feb 23 18:31:38 ift sshd\[17707\]: Failed password for root from 112.85.42.172 port 28679 ssh2 ... |
2020-02-24 00:33:52 |
| 223.71.167.164 | attack | 23.02.2020 16:37:02 Connection to port 8000 blocked by firewall |
2020-02-24 00:40:36 |
| 103.140.127.135 | attackbotsspam | Feb 18 23:08:34 roadrisk sshd[7627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.127.135 user=lp Feb 18 23:08:36 roadrisk sshd[7627]: Failed password for lp from 103.140.127.135 port 45552 ssh2 Feb 18 23:08:36 roadrisk sshd[7627]: Received disconnect from 103.140.127.135: 11: Bye Bye [preauth] Feb 18 23:27:12 roadrisk sshd[7959]: Failed password for invalid user cpanelconnecttrack from 103.140.127.135 port 33174 ssh2 Feb 18 23:27:12 roadrisk sshd[7959]: Received disconnect from 103.140.127.135: 11: Bye Bye [preauth] Feb 18 23:29:10 roadrisk sshd[8022]: Failed password for invalid user cpanelphppgadmin from 103.140.127.135 port 55074 ssh2 Feb 18 23:29:10 roadrisk sshd[8022]: Received disconnect from 103.140.127.135: 11: Bye Bye [preauth] Feb 18 23:31:17 roadrisk sshd[8044]: Failed password for invalid user ubuntu from 103.140.127.135 port 48738 ssh2 Feb 18 23:31:17 roadrisk sshd[8044]: Received disconnect from 103.140......... ------------------------------- |
2020-02-24 00:45:32 |
| 112.116.0.59 | attackspam | Brute force blocker - service: proftpd1 - aantal: 155 - Thu Jun 21 04:40:16 2018 |
2020-02-24 00:48:23 |