城市(city): Prague
省份(region): Prague - the Capital (Praha - hlavni mesto)
国家(country): Czechia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.138.104.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.138.104.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011700 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 16:24:29 CST 2025
;; MSG SIZE rcvd: 106
Host 29.104.138.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.104.138.94.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 120.92.153.47 | attackbotsspam | Too many connections or unauthorized access detected from Yankee banned ip |
2019-10-06 13:48:33 |
| 128.199.170.77 | attack | Oct 6 06:54:00 icinga sshd[11580]: Failed password for root from 128.199.170.77 port 49460 ssh2 ... |
2019-10-06 13:28:14 |
| 14.230.168.102 | attackbots | Automatic report - Banned IP Access |
2019-10-06 13:12:23 |
| 89.248.162.168 | attackbotsspam | 10/05/2019-23:54:14.330881 89.248.162.168 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-06 13:04:18 |
| 24.52.81.218 | attack | port scan and connect, tcp 80 (http) |
2019-10-06 13:21:46 |
| 222.186.173.183 | attackbots | Oct 4 07:42:44 microserver sshd[36306]: Failed none for root from 222.186.173.183 port 10422 ssh2 Oct 4 07:42:45 microserver sshd[36306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root Oct 4 07:42:48 microserver sshd[36306]: Failed password for root from 222.186.173.183 port 10422 ssh2 Oct 4 07:42:52 microserver sshd[36306]: Failed password for root from 222.186.173.183 port 10422 ssh2 Oct 4 07:42:56 microserver sshd[36306]: Failed password for root from 222.186.173.183 port 10422 ssh2 Oct 4 11:32:00 microserver sshd[2112]: Failed none for root from 222.186.173.183 port 53162 ssh2 Oct 4 11:32:01 microserver sshd[2112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root Oct 4 11:32:04 microserver sshd[2112]: Failed password for root from 222.186.173.183 port 53162 ssh2 Oct 4 11:32:08 microserver sshd[2112]: Failed password for root from 222.186.173.183 port 53162 ssh2 Oct |
2019-10-06 13:15:11 |
| 138.68.90.158 | attack | 2019-10-06T04:55:19.445940abusebot-5.cloudsearch.cf sshd\[6845\]: Invalid user Sporting123 from 138.68.90.158 port 54868 |
2019-10-06 13:03:18 |
| 129.211.27.10 | attack | 2019-10-06T03:52:58.006476abusebot.cloudsearch.cf sshd\[19349\]: Invalid user Scanner@123 from 129.211.27.10 port 60495 |
2019-10-06 13:54:32 |
| 59.127.27.196 | attackbots | Port scan |
2019-10-06 13:56:25 |
| 106.54.213.28 | attack | Oct 6 04:54:20 localhost sshd\[44093\]: Invalid user 123Kim from 106.54.213.28 port 56556 Oct 6 04:54:20 localhost sshd\[44093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.28 Oct 6 04:54:22 localhost sshd\[44093\]: Failed password for invalid user 123Kim from 106.54.213.28 port 56556 ssh2 Oct 6 04:58:40 localhost sshd\[44255\]: Invalid user 12\#45qwErtasDfgzxCvb from 106.54.213.28 port 36024 Oct 6 04:58:40 localhost sshd\[44255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.28 ... |
2019-10-06 13:08:12 |
| 222.186.175.154 | attackbots | Oct 6 07:32:02 root sshd[3118]: Failed password for root from 222.186.175.154 port 45414 ssh2 Oct 6 07:32:06 root sshd[3118]: Failed password for root from 222.186.175.154 port 45414 ssh2 Oct 6 07:32:11 root sshd[3118]: Failed password for root from 222.186.175.154 port 45414 ssh2 Oct 6 07:32:16 root sshd[3118]: Failed password for root from 222.186.175.154 port 45414 ssh2 ... |
2019-10-06 13:40:37 |
| 96.44.132.86 | attackspam | Brute force attempt |
2019-10-06 13:19:18 |
| 165.227.46.221 | attackbots | Oct 6 00:46:47 TORMINT sshd\[29777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.221 user=root Oct 6 00:46:48 TORMINT sshd\[29777\]: Failed password for root from 165.227.46.221 port 33138 ssh2 Oct 6 00:51:25 TORMINT sshd\[30127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.221 user=root ... |
2019-10-06 13:47:41 |
| 168.128.13.252 | attack | Oct 6 04:56:10 ip-172-31-62-245 sshd\[9065\]: Invalid user Nigeria@123 from 168.128.13.252\ Oct 6 04:56:12 ip-172-31-62-245 sshd\[9065\]: Failed password for invalid user Nigeria@123 from 168.128.13.252 port 45262 ssh2\ Oct 6 05:00:13 ip-172-31-62-245 sshd\[9084\]: Invalid user Pierre-123 from 168.128.13.252\ Oct 6 05:00:16 ip-172-31-62-245 sshd\[9084\]: Failed password for invalid user Pierre-123 from 168.128.13.252 port 56388 ssh2\ Oct 6 05:04:31 ip-172-31-62-245 sshd\[9131\]: Invalid user Losenord0101 from 168.128.13.252\ |
2019-10-06 13:41:13 |
| 51.254.37.192 | attackspam | 2019-10-06T05:01:28.516679shield sshd\[25139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.gogoski.fr user=root 2019-10-06T05:01:30.613030shield sshd\[25139\]: Failed password for root from 51.254.37.192 port 45064 ssh2 2019-10-06T05:05:18.793791shield sshd\[25510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.gogoski.fr user=root 2019-10-06T05:05:20.464210shield sshd\[25510\]: Failed password for root from 51.254.37.192 port 56450 ssh2 2019-10-06T05:09:05.433036shield sshd\[25912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.gogoski.fr user=root |
2019-10-06 13:20:14 |