城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.85.120.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.85.120.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030900 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 21:36:03 CST 2025
;; MSG SIZE rcvd: 106
Host 13.120.85.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.120.85.114.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.8.226 | attackbots | IP: 142.93.8.226 ASN: AS14061 DigitalOcean LLC Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 16/12/2019 9:52:45 AM UTC |
2019-12-16 18:02:46 |
| 117.102.105.203 | attackbots | Dec 16 10:46:19 ns381471 sshd[6448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.105.203 Dec 16 10:46:21 ns381471 sshd[6448]: Failed password for invalid user meneses from 117.102.105.203 port 39140 ssh2 |
2019-12-16 18:14:08 |
| 14.169.222.72 | attack | IP: 14.169.222.72 ASN: AS45899 VNPT Corp Port: Message Submission 587 Found in one or more Blacklists Date: 16/12/2019 10:07:49 AM UTC |
2019-12-16 18:09:34 |
| 218.92.0.170 | attackbotsspam | Dec 16 10:59:48 MK-Soft-VM4 sshd[3576]: Failed password for root from 218.92.0.170 port 10421 ssh2 Dec 16 10:59:53 MK-Soft-VM4 sshd[3576]: Failed password for root from 218.92.0.170 port 10421 ssh2 ... |
2019-12-16 18:03:59 |
| 181.41.216.141 | attack | IP blocked |
2019-12-16 18:13:07 |
| 202.98.229.44 | attack | SSH Bruteforce attempt |
2019-12-16 17:55:26 |
| 40.92.19.60 | attackspam | Dec 16 11:39:44 debian-2gb-vpn-nbg1-1 kernel: [863954.485721] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.19.60 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=104 ID=21495 DF PROTO=TCP SPT=57696 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0 |
2019-12-16 18:34:15 |
| 104.248.124.165 | attackspam | IP: 104.248.124.165 ASN: AS14061 DigitalOcean LLC Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 16/12/2019 10:07:44 AM UTC |
2019-12-16 18:17:31 |
| 41.208.73.21 | attack | Unauthorised access (Dec 16) SRC=41.208.73.21 LEN=44 TTL=242 ID=51739 TCP DPT=445 WINDOW=1024 SYN |
2019-12-16 18:10:44 |
| 148.70.210.77 | attackspam | Fail2Ban - SSH Bruteforce Attempt |
2019-12-16 18:32:35 |
| 27.254.194.99 | attackbotsspam | Dec 16 10:55:36 legacy sshd[19641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99 Dec 16 10:55:38 legacy sshd[19641]: Failed password for invalid user idccc from 27.254.194.99 port 54464 ssh2 Dec 16 11:03:13 legacy sshd[20004]: Failed password for root from 27.254.194.99 port 34828 ssh2 ... |
2019-12-16 18:22:37 |
| 222.252.243.20 | attackspam | Unauthorised access (Dec 16) SRC=222.252.243.20 LEN=52 PREC=0x20 TTL=54 ID=27634 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-16 18:14:52 |
| 220.132.57.245 | attackbotsspam | Lines containing failures of 220.132.57.245 Dec 16 06:45:51 shared01 postfix/smtpd[28256]: connect from 220-132-57-245.HINET-IP.hinet.net[220.132.57.245] Dec 16 06:45:54 shared01 policyd-spf[4038]: prepend Received-SPF: None (mailfrom) identhostnamey=mailfrom; client-ip=220.132.57.245; helo=220-132-57-245.hinet-ip.hinet.net; envelope-from=x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=220.132.57.245 |
2019-12-16 18:28:07 |
| 45.224.105.61 | attack | Lines containing failures of 45.224.105.61 Dec 16 06:48:25 shared10 sshd[1316]: Invalid user admin from 45.224.105.61 port 58373 Dec 16 06:48:25 shared10 sshd[1316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.105.61 Dec 16 06:48:27 shared10 sshd[1316]: Failed password for invalid user admin from 45.224.105.61 port 58373 ssh2 Dec 16 06:48:28 shared10 sshd[1316]: Connection closed by invalid user admin 45.224.105.61 port 58373 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.224.105.61 |
2019-12-16 17:57:14 |
| 137.74.167.250 | attackbots | Invalid user adminttd from 137.74.167.250 port 36939 |
2019-12-16 18:16:35 |