城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.141.169.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.141.169.117. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:06:28 CST 2025
;; MSG SIZE rcvd: 107
Host 117.169.141.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 117.169.141.21.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.136.108.85 | attackbotsspam | Feb 8 19:55:19 baguette sshd\[13267\]: Invalid user 0 from 45.136.108.85 port 52876 Feb 8 19:55:19 baguette sshd\[13267\]: Invalid user 0 from 45.136.108.85 port 52876 Feb 8 19:55:22 baguette sshd\[13269\]: Invalid user 22 from 45.136.108.85 port 56590 Feb 8 19:55:22 baguette sshd\[13269\]: Invalid user 22 from 45.136.108.85 port 56590 Feb 8 19:55:26 baguette sshd\[13271\]: Invalid user 101 from 45.136.108.85 port 5686 Feb 8 19:55:26 baguette sshd\[13271\]: Invalid user 101 from 45.136.108.85 port 5686 ... |
2020-02-09 04:36:47 |
| 180.96.28.87 | attackspambots | Feb 8 07:54:08 web1 sshd\[17129\]: Invalid user rao from 180.96.28.87 Feb 8 07:54:08 web1 sshd\[17129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.28.87 Feb 8 07:54:11 web1 sshd\[17129\]: Failed password for invalid user rao from 180.96.28.87 port 19072 ssh2 Feb 8 07:59:08 web1 sshd\[17554\]: Invalid user cro from 180.96.28.87 Feb 8 07:59:08 web1 sshd\[17554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.28.87 |
2020-02-09 04:16:39 |
| 188.68.0.112 | attackspambots | 16.222.773,06-13/04 [bc27/m129] PostRequest-Spammer scoring: maputo01_x2b |
2020-02-09 04:31:12 |
| 92.222.36.74 | attackspam | $f2bV_matches |
2020-02-09 04:26:54 |
| 60.250.23.233 | attackspam | $f2bV_matches |
2020-02-09 04:31:38 |
| 103.41.97.101 | attack | 20/2/8@09:23:47: FAIL: Alarm-Network address from=103.41.97.101 ... |
2020-02-09 04:11:20 |
| 219.148.37.250 | attackspam | Unauthorised access (Feb 8) SRC=219.148.37.250 LEN=40 TTL=241 ID=31569 TCP DPT=1433 WINDOW=1024 SYN |
2020-02-09 04:10:54 |
| 90.59.57.168 | attackbotsspam | Feb 8 20:24:04 PAR-182295 sshd[1211587]: Failed password for invalid user mej from 90.59.57.168 port 50836 ssh2 Feb 8 20:49:52 PAR-182295 sshd[1226894]: Failed password for invalid user uls from 90.59.57.168 port 56552 ssh2 Feb 8 21:12:16 PAR-182295 sshd[1240289]: Failed password for invalid user rng from 90.59.57.168 port 47216 ssh2 |
2020-02-09 04:27:08 |
| 139.170.150.252 | attackbots | Feb 8 15:29:42 firewall sshd[450]: Invalid user ftq from 139.170.150.252 Feb 8 15:29:44 firewall sshd[450]: Failed password for invalid user ftq from 139.170.150.252 port 38548 ssh2 Feb 8 15:33:58 firewall sshd[608]: Invalid user ibc from 139.170.150.252 ... |
2020-02-09 04:23:43 |
| 112.113.227.55 | attackspam | Sat Feb 8 07:23:56 2020 - Child process 32361 handling connection Sat Feb 8 07:23:56 2020 - New connection from: 112.113.227.55:36342 Sat Feb 8 07:23:56 2020 - Sending data to client: [Login: ] Sat Feb 8 07:24:27 2020 - Child aborting Sat Feb 8 07:24:27 2020 - Reporting IP address: 112.113.227.55 - mflag: 0 |
2020-02-09 04:08:15 |
| 37.49.226.50 | attackspam | (Feb 8) LEN=40 TTL=57 ID=22313 TCP DPT=8080 WINDOW=55868 SYN (Feb 8) LEN=40 TTL=57 ID=62870 TCP DPT=8080 WINDOW=55868 SYN (Feb 8) LEN=40 TTL=57 ID=22504 TCP DPT=8080 WINDOW=19786 SYN (Feb 7) LEN=40 TTL=57 ID=23245 TCP DPT=8080 WINDOW=47442 SYN (Feb 7) LEN=40 TTL=57 ID=28082 TCP DPT=8080 WINDOW=24676 SYN (Feb 6) LEN=40 TTL=57 ID=62643 TCP DPT=8080 WINDOW=24676 SYN (Feb 6) LEN=40 TTL=57 ID=44574 TCP DPT=8080 WINDOW=47442 SYN (Feb 6) LEN=40 TTL=57 ID=1179 TCP DPT=8080 WINDOW=47442 SYN (Feb 3) LEN=40 TTL=57 ID=27194 TCP DPT=8080 WINDOW=24676 SYN (Feb 3) LEN=40 TTL=57 ID=3354 TCP DPT=8080 WINDOW=8018 SYN (Feb 3) LEN=40 TTL=57 ID=14967 TCP DPT=8080 WINDOW=40914 SYN (Feb 2) LEN=40 TTL=57 ID=59437 TCP DPT=8080 WINDOW=57234 SYN (Feb 2) LEN=40 TTL=57 ID=2242 TCP DPT=8080 WINDOW=57234 SYN |
2020-02-09 04:44:28 |
| 188.87.101.119 | attack | Feb 8 16:32:50 cp sshd[20253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.87.101.119 |
2020-02-09 04:21:53 |
| 124.104.185.67 | attackbots | $f2bV_matches |
2020-02-09 04:12:28 |
| 89.248.160.193 | attackbots | Feb 8 20:13:27 h2177944 kernel: \[4387250.939529\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=28212 PROTO=TCP SPT=40106 DPT=20440 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 20:13:27 h2177944 kernel: \[4387250.939544\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=28212 PROTO=TCP SPT=40106 DPT=20440 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 20:26:25 h2177944 kernel: \[4388028.664494\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23799 PROTO=TCP SPT=40106 DPT=20311 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 20:26:25 h2177944 kernel: \[4388028.664510\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23799 PROTO=TCP SPT=40106 DPT=20311 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 20:46:18 h2177944 kernel: \[4389222.144375\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.160.193 DST=85. |
2020-02-09 04:04:57 |
| 109.115.127.219 | attackbots | Feb 8 14:22:42 yesfletchmain sshd\[18108\]: User pi from 109.115.127.219 not allowed because not listed in AllowUsers Feb 8 14:22:42 yesfletchmain sshd\[18107\]: User pi from 109.115.127.219 not allowed because not listed in AllowUsers Feb 8 14:22:42 yesfletchmain sshd\[18107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.115.127.219 user=pi Feb 8 14:22:42 yesfletchmain sshd\[18108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.115.127.219 user=pi Feb 8 14:22:44 yesfletchmain sshd\[18107\]: Failed password for invalid user pi from 109.115.127.219 port 40030 ssh2 ... |
2020-02-09 04:53:40 |