城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.99.104.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.99.104.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:36:42 CST 2025
;; MSG SIZE rcvd: 105
Host 29.104.99.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.104.99.21.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
151.80.41.64 | attackbots | Feb 20 23:48:48 MK-Soft-VM5 sshd[11987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.64 Feb 20 23:48:50 MK-Soft-VM5 sshd[11987]: Failed password for invalid user zll from 151.80.41.64 port 58469 ssh2 ... |
2020-02-21 06:59:12 |
134.175.85.79 | attackspam | Feb 20 23:49:02 vps58358 sshd\[12049\]: Invalid user alex from 134.175.85.79Feb 20 23:49:04 vps58358 sshd\[12049\]: Failed password for invalid user alex from 134.175.85.79 port 43646 ssh2Feb 20 23:51:56 vps58358 sshd\[12066\]: Failed password for sys from 134.175.85.79 port 37950 ssh2Feb 20 23:54:29 vps58358 sshd\[12079\]: Invalid user michael from 134.175.85.79Feb 20 23:54:31 vps58358 sshd\[12079\]: Failed password for invalid user michael from 134.175.85.79 port 60476 ssh2Feb 20 23:57:19 vps58358 sshd\[12103\]: Invalid user smbread from 134.175.85.79 ... |
2020-02-21 07:02:59 |
171.253.99.102 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-21 07:02:44 |
222.186.190.2 | attackspam | Feb 21 00:18:20 h2812830 sshd[25367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Feb 21 00:18:22 h2812830 sshd[25367]: Failed password for root from 222.186.190.2 port 27336 ssh2 Feb 21 00:18:26 h2812830 sshd[25367]: Failed password for root from 222.186.190.2 port 27336 ssh2 Feb 21 00:18:20 h2812830 sshd[25367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Feb 21 00:18:22 h2812830 sshd[25367]: Failed password for root from 222.186.190.2 port 27336 ssh2 Feb 21 00:18:26 h2812830 sshd[25367]: Failed password for root from 222.186.190.2 port 27336 ssh2 Feb 21 00:18:20 h2812830 sshd[25367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Feb 21 00:18:22 h2812830 sshd[25367]: Failed password for root from 222.186.190.2 port 27336 ssh2 Feb 21 00:18:26 h2812830 sshd[25367]: Failed password for ... |
2020-02-21 07:22:38 |
42.159.9.62 | attackbotsspam | Feb 20 21:48:36 giraffe sshd[7411]: Invalid user asterisk from 42.159.9.62 Feb 20 21:48:36 giraffe sshd[7411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.9.62 Feb 20 21:48:38 giraffe sshd[7411]: Failed password for invalid user asterisk from 42.159.9.62 port 58598 ssh2 Feb 20 21:48:39 giraffe sshd[7411]: Received disconnect from 42.159.9.62 port 58598:11: Bye Bye [preauth] Feb 20 21:48:39 giraffe sshd[7411]: Disconnected from 42.159.9.62 port 58598 [preauth] Feb 20 22:04:00 giraffe sshd[7768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.9.62 user=backup Feb 20 22:04:02 giraffe sshd[7768]: Failed password for backup from 42.159.9.62 port 50730 ssh2 Feb 20 22:04:03 giraffe sshd[7768]: Received disconnect from 42.159.9.62 port 50730:11: Bye Bye [preauth] Feb 20 22:04:03 giraffe sshd[7768]: Disconnected from 42.159.9.62 port 50730 [preauth] Feb 20 22:06:47 giraffe sshd[78........ ------------------------------- |
2020-02-21 07:18:02 |
211.159.152.252 | attackbots | Feb 20 23:38:46 pkdns2 sshd\[16797\]: Invalid user eran from 211.159.152.252Feb 20 23:38:47 pkdns2 sshd\[16797\]: Failed password for invalid user eran from 211.159.152.252 port 11606 ssh2Feb 20 23:43:17 pkdns2 sshd\[16989\]: Invalid user prince from 211.159.152.252Feb 20 23:43:19 pkdns2 sshd\[16989\]: Failed password for invalid user prince from 211.159.152.252 port 25379 ssh2Feb 20 23:47:49 pkdns2 sshd\[17162\]: Invalid user bayou from 211.159.152.252Feb 20 23:47:51 pkdns2 sshd\[17162\]: Failed password for invalid user bayou from 211.159.152.252 port 39195 ssh2 ... |
2020-02-21 06:55:03 |
152.136.37.135 | attackspam | Feb 20 17:51:57 plusreed sshd[28101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.37.135 user=backup Feb 20 17:51:59 plusreed sshd[28101]: Failed password for backup from 152.136.37.135 port 43554 ssh2 ... |
2020-02-21 07:08:30 |
49.247.207.56 | attackbots | Invalid user alexadra from 49.247.207.56 port 49764 |
2020-02-21 07:14:19 |
185.156.73.52 | attackspam | 02/20/2020-17:54:25.843771 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-21 07:27:27 |
190.116.41.227 | attackbotsspam | Invalid user lars from 190.116.41.227 port 46818 |
2020-02-21 07:24:20 |
121.177.143.35 | attackspambots | Port probing on unauthorized port 23 |
2020-02-21 07:19:27 |
222.186.175.169 | attackspambots | Feb 21 00:01:12 eventyay sshd[1634]: Failed password for root from 222.186.175.169 port 3760 ssh2 Feb 21 00:01:25 eventyay sshd[1634]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 3760 ssh2 [preauth] Feb 21 00:01:30 eventyay sshd[1637]: Failed password for root from 222.186.175.169 port 13018 ssh2 ... |
2020-02-21 07:04:38 |
104.194.9.13 | attack | Port scan on 5 port(s): 5061 5062 5063 5064 5065 |
2020-02-21 07:21:32 |
207.242.238.194 | attackspam | 20/2/20@16:47:29: FAIL: Alarm-Network address from=207.242.238.194 20/2/20@16:47:29: FAIL: Alarm-Network address from=207.242.238.194 ... |
2020-02-21 07:12:50 |
177.134.215.62 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-02-21 07:32:04 |