城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.214.94.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.214.94.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:54:40 CST 2025
;; MSG SIZE rcvd: 106
Host 21.94.214.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.94.214.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.176.27.174 | attackbotsspam | 05/31/2020-05:16:31.596409 185.176.27.174 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-31 17:29:54 |
| 218.104.225.140 | attackbotsspam | 2020-05-31T05:18:41.4242231495-001 sshd[39935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.225.140 user=root 2020-05-31T05:18:43.4106471495-001 sshd[39935]: Failed password for root from 218.104.225.140 port 64143 ssh2 2020-05-31T05:22:25.3187151495-001 sshd[40079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.225.140 user=root 2020-05-31T05:22:26.7230721495-001 sshd[40079]: Failed password for root from 218.104.225.140 port 4555 ssh2 2020-05-31T05:26:06.0887791495-001 sshd[40236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.225.140 user=root 2020-05-31T05:26:08.4990821495-001 sshd[40236]: Failed password for root from 218.104.225.140 port 15041 ssh2 ... |
2020-05-31 18:10:41 |
| 218.253.255.233 | attack | May 31 10:34:54 tuxlinux sshd[61877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.255.233 user=root May 31 10:34:56 tuxlinux sshd[61877]: Failed password for root from 218.253.255.233 port 59298 ssh2 May 31 10:34:54 tuxlinux sshd[61877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.255.233 user=root May 31 10:34:56 tuxlinux sshd[61877]: Failed password for root from 218.253.255.233 port 59298 ssh2 May 31 10:38:52 tuxlinux sshd[64871]: Invalid user admin from 218.253.255.233 port 39418 ... |
2020-05-31 17:34:05 |
| 178.128.62.78 | attackspam | May 31 09:08:52 DAAP sshd[3935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.62.78 user=root May 31 09:08:54 DAAP sshd[3935]: Failed password for root from 178.128.62.78 port 38782 ssh2 May 31 09:15:07 DAAP sshd[4047]: Invalid user unicorn from 178.128.62.78 port 56632 May 31 09:15:07 DAAP sshd[4047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.62.78 May 31 09:15:07 DAAP sshd[4047]: Invalid user unicorn from 178.128.62.78 port 56632 May 31 09:15:08 DAAP sshd[4047]: Failed password for invalid user unicorn from 178.128.62.78 port 56632 ssh2 ... |
2020-05-31 18:11:11 |
| 45.65.230.47 | attack | 2020-05-3105:47:431jfEwo-0002uX-JO\<=info@whatsup2013.chH=\(localhost\)[222.104.177.185]:55724P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3016id=07c7287b705b8e82a5e05605f136bcb083de8cc6@whatsup2013.chT="tochukwuebukaisrael313"forchukwuebukaisrael313@gmail.comromero18miguelangel@gmail.cometheridge47@gmail.com2020-05-3105:48:021jfEx6-0002vO-Qw\<=info@whatsup2013.chH=\(localhost\)[14.240.16.46]:38303P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2975id=86f75a1c173ce91a39c7316269bd84280be1b22b04@whatsup2013.chT="toprofjavier11"forprofjavier11@gmail.comruzni51@gmail.comredneck196925@hotmail.com2020-05-3105:48:131jfExJ-0002wr-AQ\<=info@whatsup2013.chH=\(localhost\)[14.169.251.93]:43661P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3031id=0f0af2a1aa8154587f3a8cdf2bec666a597c2950@whatsup2013.chT="tojeffreymadsen"forjeffreymadsen@gmail.comcomposer3201@gmail.comerocx92@gmail.com20 |
2020-05-31 18:08:16 |
| 115.238.116.30 | attack | May 31 09:43:02 vps647732 sshd[875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.116.30 May 31 09:43:04 vps647732 sshd[875]: Failed password for invalid user claudette from 115.238.116.30 port 31309 ssh2 ... |
2020-05-31 18:00:19 |
| 85.185.161.202 | attackbotsspam | Invalid user cooper from 85.185.161.202 port 50144 |
2020-05-31 17:42:57 |
| 152.136.50.26 | attackspam | k+ssh-bruteforce |
2020-05-31 17:59:50 |
| 68.183.100.153 | attack | May 31 11:08:12 ns382633 sshd\[15388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.100.153 user=root May 31 11:08:13 ns382633 sshd\[15388\]: Failed password for root from 68.183.100.153 port 49224 ssh2 May 31 11:16:42 ns382633 sshd\[17043\]: Invalid user payroll from 68.183.100.153 port 49756 May 31 11:16:42 ns382633 sshd\[17043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.100.153 May 31 11:16:44 ns382633 sshd\[17043\]: Failed password for invalid user payroll from 68.183.100.153 port 49756 ssh2 |
2020-05-31 18:11:25 |
| 87.251.74.136 | attackbotsspam | May 31 11:31:30 debian-2gb-nbg1-2 kernel: \[13176267.263550\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.136 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=44858 PROTO=TCP SPT=55567 DPT=3824 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-31 17:35:34 |
| 186.224.238.253 | attack | $f2bV_matches |
2020-05-31 18:03:04 |
| 182.253.68.122 | attackbotsspam | May 31 11:48:36 eventyay sshd[21345]: Failed password for root from 182.253.68.122 port 36680 ssh2 May 31 11:52:45 eventyay sshd[21458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122 May 31 11:52:48 eventyay sshd[21458]: Failed password for invalid user student from 182.253.68.122 port 41922 ssh2 ... |
2020-05-31 18:04:00 |
| 54.37.68.66 | attackbotsspam | Invalid user gene from 54.37.68.66 port 34972 |
2020-05-31 17:44:40 |
| 117.4.101.26 | attackspam | 2020-05-3105:47:431jfEwo-0002uX-JO\<=info@whatsup2013.chH=\(localhost\)[222.104.177.185]:55724P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3016id=07c7287b705b8e82a5e05605f136bcb083de8cc6@whatsup2013.chT="tochukwuebukaisrael313"forchukwuebukaisrael313@gmail.comromero18miguelangel@gmail.cometheridge47@gmail.com2020-05-3105:48:021jfEx6-0002vO-Qw\<=info@whatsup2013.chH=\(localhost\)[14.240.16.46]:38303P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2975id=86f75a1c173ce91a39c7316269bd84280be1b22b04@whatsup2013.chT="toprofjavier11"forprofjavier11@gmail.comruzni51@gmail.comredneck196925@hotmail.com2020-05-3105:48:131jfExJ-0002wr-AQ\<=info@whatsup2013.chH=\(localhost\)[14.169.251.93]:43661P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3031id=0f0af2a1aa8154587f3a8cdf2bec666a597c2950@whatsup2013.chT="tojeffreymadsen"forjeffreymadsen@gmail.comcomposer3201@gmail.comerocx92@gmail.com20 |
2020-05-31 18:07:19 |
| 51.38.65.208 | attack | May 31 10:07:52 web01 sshd[13015]: Failed password for root from 51.38.65.208 port 40940 ssh2 ... |
2020-05-31 17:52:11 |