城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.102.114.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.102.114.11. IN A
;; AUTHORITY SECTION:
. 144 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:37:36 CST 2022
;; MSG SIZE rcvd: 107
11.114.102.116.in-addr.arpa has no PTR record
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 11.114.102.116.in-addr.arpa.: No answer
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 110.77.135.229 | attackbotsspam | TCP src-port=36231 dst-port=25 abuseat-org barracuda zen-spamhaus (749) |
2019-08-29 06:34:19 |
| 90.30.201.230 | attack | Aug 28 23:16:46 rotator sshd\[26533\]: Invalid user telma from 90.30.201.230Aug 28 23:16:49 rotator sshd\[26533\]: Failed password for invalid user telma from 90.30.201.230 port 55568 ssh2Aug 28 23:21:14 rotator sshd\[27306\]: Invalid user ftp from 90.30.201.230Aug 28 23:21:16 rotator sshd\[27306\]: Failed password for invalid user ftp from 90.30.201.230 port 50703 ssh2Aug 28 23:25:46 rotator sshd\[28074\]: Invalid user lyn from 90.30.201.230Aug 28 23:25:48 rotator sshd\[28074\]: Failed password for invalid user lyn from 90.30.201.230 port 45835 ssh2 ... |
2019-08-29 06:40:04 |
| 201.190.218.95 | attack | port scan and connect, tcp 23 (telnet) |
2019-08-29 07:04:43 |
| 116.106.148.175 | attackspam | 9000/tcp 23/tcp [2019-08-26/27]2pkt |
2019-08-29 06:56:50 |
| 200.11.230.169 | attackspam | Spam Timestamp : 28-Aug-19 14:22 BlockList Provider combined abuse (753) |
2019-08-29 06:26:54 |
| 89.208.197.236 | attackspambots | Aug 28 15:47:53 vps34202 sshd[19129]: Did not receive identification string from 89.208.197.236 Aug 28 15:49:34 vps34202 sshd[19140]: reveeclipse mapping checking getaddrinfo for 236.mcs.mail.ru [89.208.197.236] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 28 15:49:34 vps34202 sshd[19140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.197.236 user=r.r Aug 28 15:49:36 vps34202 sshd[19140]: Failed password for r.r from 89.208.197.236 port 54358 ssh2 Aug 28 15:49:37 vps34202 sshd[19140]: Received disconnect from 89.208.197.236: 11: Bye Bye [preauth] Aug 28 15:49:44 vps34202 sshd[19148]: reveeclipse mapping checking getaddrinfo for 236.mcs.mail.ru [89.208.197.236] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 28 15:49:44 vps34202 sshd[19148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.197.236 user=r.r Aug 28 15:49:46 vps34202 sshd[19148]: Failed password for r.r from 89.208.197.236 p........ ------------------------------- |
2019-08-29 06:24:28 |
| 42.232.18.45 | attackbots | Aug 28 15:54:24 pl3server sshd[1182169]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [42.232.18.45] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 28 15:54:24 pl3server sshd[1182169]: Invalid user admin from 42.232.18.45 Aug 28 15:54:24 pl3server sshd[1182169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.232.18.45 Aug 28 15:54:26 pl3server sshd[1182169]: Failed password for invalid user admin from 42.232.18.45 port 41334 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=42.232.18.45 |
2019-08-29 06:44:34 |
| 115.159.25.60 | attackspam | Aug 28 21:10:07 MK-Soft-Root2 sshd\[477\]: Invalid user sbserver from 115.159.25.60 port 52510 Aug 28 21:10:07 MK-Soft-Root2 sshd\[477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.25.60 Aug 28 21:10:09 MK-Soft-Root2 sshd\[477\]: Failed password for invalid user sbserver from 115.159.25.60 port 52510 ssh2 ... |
2019-08-29 07:05:04 |
| 124.239.196.154 | attack | Aug 28 09:23:28 hpm sshd\[3866\]: Invalid user tc from 124.239.196.154 Aug 28 09:23:28 hpm sshd\[3866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.196.154 Aug 28 09:23:29 hpm sshd\[3866\]: Failed password for invalid user tc from 124.239.196.154 port 35408 ssh2 Aug 28 09:27:29 hpm sshd\[4198\]: Invalid user lorene from 124.239.196.154 Aug 28 09:27:29 hpm sshd\[4198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.196.154 |
2019-08-29 06:58:42 |
| 118.200.41.3 | attackbots | Aug 29 01:16:49 tuotantolaitos sshd[16586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.200.41.3 Aug 29 01:16:51 tuotantolaitos sshd[16586]: Failed password for invalid user anne from 118.200.41.3 port 35904 ssh2 ... |
2019-08-29 06:32:11 |
| 50.239.143.195 | attackspambots | Invalid user sistema from 50.239.143.195 port 59110 |
2019-08-29 06:57:48 |
| 180.182.47.132 | attackspambots | 2019-08-28T20:43:55.990036abusebot-6.cloudsearch.cf sshd\[2819\]: Invalid user compta from 180.182.47.132 port 51065 |
2019-08-29 06:43:34 |
| 167.99.55.254 | attack | Aug 29 00:20:16 legacy sshd[18665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.55.254 Aug 29 00:20:18 legacy sshd[18665]: Failed password for invalid user teamspeak from 167.99.55.254 port 34414 ssh2 Aug 29 00:24:09 legacy sshd[18753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.55.254 ... |
2019-08-29 06:47:22 |
| 54.37.136.170 | attackspam | Aug 28 09:31:39 auw2 sshd\[13153\]: Invalid user mz from 54.37.136.170 Aug 28 09:31:39 auw2 sshd\[13153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.ip-54-37-136.eu Aug 28 09:31:41 auw2 sshd\[13153\]: Failed password for invalid user mz from 54.37.136.170 port 43816 ssh2 Aug 28 09:35:46 auw2 sshd\[13566\]: Invalid user dixie from 54.37.136.170 Aug 28 09:35:46 auw2 sshd\[13566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.ip-54-37-136.eu |
2019-08-29 06:37:54 |
| 112.64.32.118 | attackspam | Aug 28 07:56:09 hanapaa sshd\[18028\]: Invalid user snake from 112.64.32.118 Aug 28 07:56:09 hanapaa sshd\[18028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118 Aug 28 07:56:11 hanapaa sshd\[18028\]: Failed password for invalid user snake from 112.64.32.118 port 41190 ssh2 Aug 28 07:59:29 hanapaa sshd\[18359\]: Invalid user administrador from 112.64.32.118 Aug 28 07:59:29 hanapaa sshd\[18359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118 |
2019-08-29 06:29:00 |