城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.66.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.200.66.25. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 16:26:28 CST 2025
;; MSG SIZE rcvd: 106
b'Host 25.66.200.104.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 25.66.200.104.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.187.119.146 | attackbotsspam | 2019-06-21 16:37:54 1heKfo-00082S-9v SMTP connection from \(static.vnpt.vn\) \[14.187.119.146\]:12095 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-21 16:37:58 1heKft-00082V-QN SMTP connection from \(static.vnpt.vn\) \[14.187.119.146\]:26808 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-21 16:38:01 1heKfv-00082W-W5 SMTP connection from \(static.vnpt.vn\) \[14.187.119.146\]:12151 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:19:11 |
| 14.192.149.178 | attackspam | 2020-01-24 23:06:50 1iv76H-0005co-VX SMTP connection from \(fn149-static178.fariya.com\) \[14.192.149.178\]:17910 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 23:06:55 1iv76M-0005cv-TW SMTP connection from \(fn149-static178.fariya.com\) \[14.192.149.178\]:17976 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 23:06:59 1iv76Q-0005d2-Uu SMTP connection from \(fn149-static178.fariya.com\) \[14.192.149.178\]:18035 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:09:45 |
| 202.116.237.20 | attackspambots | Feb 4 04:38:26 serwer sshd\[13602\]: User ftpuser from 202.116.237.20 not allowed because not listed in AllowUsers Feb 4 04:38:26 serwer sshd\[13602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.116.237.20 user=ftpuser Feb 4 04:38:28 serwer sshd\[13602\]: Failed password for invalid user ftpuser from 202.116.237.20 port 53568 ssh2 Feb 4 04:51:00 serwer sshd\[15123\]: Invalid user cochiloco from 202.116.237.20 port 27405 Feb 4 04:51:00 serwer sshd\[15123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.116.237.20 Feb 4 04:51:02 serwer sshd\[15123\]: Failed password for invalid user cochiloco from 202.116.237.20 port 27405 ssh2 Feb 4 04:53:09 serwer sshd\[15335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.116.237.20 user=root Feb 4 04:53:11 serwer sshd\[15335\]: Failed password for root from 202.116.237.20 port 35685 ssh2 Feb ... |
2020-02-04 21:41:59 |
| 14.211.0.153 | attackspam | 2019-11-21 21:18:25 H=\(ledlight.top.com\) \[14.211.0.153\]:26692 I=\[193.107.88.166\]:25 sender verify fail for \ |
2020-02-04 22:02:14 |
| 218.92.0.179 | attackspam | Feb 4 14:53:02 MK-Soft-Root2 sshd[14233]: Failed password for root from 218.92.0.179 port 9568 ssh2 Feb 4 14:53:07 MK-Soft-Root2 sshd[14233]: Failed password for root from 218.92.0.179 port 9568 ssh2 ... |
2020-02-04 22:06:33 |
| 104.244.231.60 | attackbotsspam | Feb 4 14:53:01 jane sshd[28053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.231.60 Feb 4 14:53:03 jane sshd[28053]: Failed password for invalid user ubnt from 104.244.231.60 port 65080 ssh2 ... |
2020-02-04 22:14:19 |
| 144.48.110.114 | attackspambots | Feb 4 09:29:37 grey postfix/smtpd\[30206\]: NOQUEUE: reject: RCPT from unknown\[144.48.110.114\]: 554 5.7.1 Service unavailable\; Client host \[144.48.110.114\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[144.48.110.114\]\; from=\ |
2020-02-04 21:44:26 |
| 120.132.12.162 | attackspam | Unauthorized connection attempt detected from IP address 120.132.12.162 to port 2220 [J] |
2020-02-04 21:52:02 |
| 190.191.232.180 | attackbots | Feb 4 05:52:22 grey postfix/smtpd\[28583\]: NOQUEUE: reject: RCPT from unknown\[190.191.232.180\]: 554 5.7.1 Service unavailable\; Client host \[190.191.232.180\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=190.191.232.180\; from=\ |
2020-02-04 21:38:14 |
| 64.190.202.55 | attack | Feb 4 15:04:41 srv-ubuntu-dev3 sshd[23719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.190.202.55 user=root Feb 4 15:04:43 srv-ubuntu-dev3 sshd[23719]: Failed password for root from 64.190.202.55 port 51104 ssh2 Feb 4 15:07:41 srv-ubuntu-dev3 sshd[24037]: Invalid user tie from 64.190.202.55 Feb 4 15:07:41 srv-ubuntu-dev3 sshd[24037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.190.202.55 Feb 4 15:07:41 srv-ubuntu-dev3 sshd[24037]: Invalid user tie from 64.190.202.55 Feb 4 15:07:43 srv-ubuntu-dev3 sshd[24037]: Failed password for invalid user tie from 64.190.202.55 port 57412 ssh2 Feb 4 15:10:44 srv-ubuntu-dev3 sshd[24532]: Invalid user leonard from 64.190.202.55 Feb 4 15:10:44 srv-ubuntu-dev3 sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.190.202.55 Feb 4 15:10:44 srv-ubuntu-dev3 sshd[24532]: Invalid user leonard from 64.190.2 ... |
2020-02-04 22:14:38 |
| 182.61.12.58 | attackbots | Unauthorized connection attempt detected from IP address 182.61.12.58 to port 2220 [J] |
2020-02-04 21:45:59 |
| 77.70.96.195 | attackbotsspam | Feb 4 05:46:10 serwer sshd\[21702\]: Invalid user www from 77.70.96.195 port 36558 Feb 4 05:46:10 serwer sshd\[21702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195 Feb 4 05:46:11 serwer sshd\[21702\]: Failed password for invalid user www from 77.70.96.195 port 36558 ssh2 Feb 4 05:51:02 serwer sshd\[22219\]: Invalid user incoming from 77.70.96.195 port 51080 Feb 4 05:51:02 serwer sshd\[22219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195 Feb 4 05:51:04 serwer sshd\[22219\]: Failed password for invalid user incoming from 77.70.96.195 port 51080 ssh2 Feb 4 05:53:26 serwer sshd\[22442\]: Invalid user rundlet from 77.70.96.195 port 46966 Feb 4 05:53:26 serwer sshd\[22442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195 Feb 4 05:53:29 serwer sshd\[22442\]: Failed password for invalid user rundlet from 77.70. ... |
2020-02-04 21:41:05 |
| 14.200.176.176 | attackspam | 2019-06-21 16:10:05 1heKEt-0007Oi-NS SMTP connection from 14-200-176-176.static.tpgi.com.au \[14.200.176.176\]:23957 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-21 16:10:20 1heKF8-0007P6-Et SMTP connection from 14-200-176-176.static.tpgi.com.au \[14.200.176.176\]:24052 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-21 16:10:34 1heKFL-0007PF-VF SMTP connection from 14-200-176-176.static.tpgi.com.au \[14.200.176.176\]:24145 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:08:20 |
| 182.209.86.10 | attackspam | Feb 4 14:53:13 lock-38 sshd[26079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.209.86.10 Feb 4 14:53:15 lock-38 sshd[26079]: Failed password for invalid user dev from 182.209.86.10 port 35041 ssh2 ... |
2020-02-04 21:57:57 |
| 103.84.229.146 | attackbotsspam | Feb 4 05:52:14 grey postfix/smtpd\[14724\]: NOQUEUE: reject: RCPT from unknown\[103.84.229.146\]: 554 5.7.1 Service unavailable\; Client host \[103.84.229.146\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=103.84.229.146\; from=\ |
2020-02-04 21:43:48 |