城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.32.208.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.32.208.14. IN A
;; AUTHORITY SECTION:
. 523 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:22:02 CST 2022
;; MSG SIZE rcvd: 105
14.208.32.13.in-addr.arpa domain name pointer server-13-32-208-14.iad66.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.208.32.13.in-addr.arpa name = server-13-32-208-14.iad66.r.cloudfront.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 138.122.37.1 | attackbotsspam | Sep 6 00:51:16 mailman postfix/smtpd[15985]: warning: unknown[138.122.37.1]: SASL PLAIN authentication failed: authentication failure |
2019-09-06 15:15:27 |
| 142.93.254.124 | attackbotsspam | Sep 5 21:16:42 php1 sshd\[1600\]: Invalid user student3 from 142.93.254.124 Sep 5 21:16:42 php1 sshd\[1600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.124 Sep 5 21:16:44 php1 sshd\[1600\]: Failed password for invalid user student3 from 142.93.254.124 port 44824 ssh2 Sep 5 21:21:18 php1 sshd\[2099\]: Invalid user odoo from 142.93.254.124 Sep 5 21:21:18 php1 sshd\[2099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.124 |
2019-09-06 15:27:04 |
| 69.167.187.204 | attackspambots | Automatic report - Banned IP Access |
2019-09-06 14:47:17 |
| 37.187.5.137 | attackspam | SSH Brute Force, server-1 sshd[6688]: Failed password for invalid user bot from 37.187.5.137 port 41892 ssh2 |
2019-09-06 14:44:49 |
| 129.204.254.4 | attackspam | Sep 5 21:10:44 hanapaa sshd\[32575\]: Invalid user oracle from 129.204.254.4 Sep 5 21:10:44 hanapaa sshd\[32575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4 Sep 5 21:10:45 hanapaa sshd\[32575\]: Failed password for invalid user oracle from 129.204.254.4 port 50564 ssh2 Sep 5 21:16:10 hanapaa sshd\[556\]: Invalid user node from 129.204.254.4 Sep 5 21:16:10 hanapaa sshd\[556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4 |
2019-09-06 15:18:35 |
| 222.186.19.221 | attack | firewall-block, port(s): 1900/udp |
2019-09-06 15:10:10 |
| 82.146.33.59 | attackspambots | Sep 6 08:50:06 site2 sshd\[6402\]: Invalid user botpass from 82.146.33.59Sep 6 08:50:07 site2 sshd\[6402\]: Failed password for invalid user botpass from 82.146.33.59 port 54259 ssh2Sep 6 08:54:53 site2 sshd\[6522\]: Invalid user 123456 from 82.146.33.59Sep 6 08:54:55 site2 sshd\[6522\]: Failed password for invalid user 123456 from 82.146.33.59 port 47517 ssh2Sep 6 08:59:37 site2 sshd\[6653\]: Invalid user password from 82.146.33.59 ... |
2019-09-06 15:14:28 |
| 138.68.1.18 | attack | Sep 6 06:29:21 MK-Soft-VM4 sshd\[30132\]: Invalid user qwe123 from 138.68.1.18 port 42442 Sep 6 06:29:21 MK-Soft-VM4 sshd\[30132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.1.18 Sep 6 06:29:24 MK-Soft-VM4 sshd\[30132\]: Failed password for invalid user qwe123 from 138.68.1.18 port 42442 ssh2 ... |
2019-09-06 14:45:10 |
| 142.93.232.144 | attack | Sep 6 06:51:25 www2 sshd\[37728\]: Invalid user ts2 from 142.93.232.144Sep 6 06:51:27 www2 sshd\[37728\]: Failed password for invalid user ts2 from 142.93.232.144 port 53094 ssh2Sep 6 06:55:54 www2 sshd\[38274\]: Invalid user servers from 142.93.232.144 ... |
2019-09-06 15:01:07 |
| 92.222.71.125 | attackspambots | Jun 28 05:35:28 Server10 sshd[21546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125 Jun 28 05:35:30 Server10 sshd[21546]: Failed password for invalid user student8 from 92.222.71.125 port 34534 ssh2 Jun 28 05:38:10 Server10 sshd[23718]: Invalid user admin from 92.222.71.125 port 37310 Jun 28 05:38:10 Server10 sshd[23718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125 Jun 28 05:38:12 Server10 sshd[23718]: Failed password for invalid user admin from 92.222.71.125 port 37310 ssh2 |
2019-09-06 15:27:30 |
| 41.65.56.66 | attackspam | Unauthorised access (Sep 6) SRC=41.65.56.66 LEN=52 TTL=113 ID=15359 DF TCP DPT=445 WINDOW=8192 SYN |
2019-09-06 14:56:37 |
| 146.164.21.68 | attack | Sep 6 02:31:34 ny01 sshd[701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.21.68 Sep 6 02:31:36 ny01 sshd[701]: Failed password for invalid user vbox from 146.164.21.68 port 50345 ssh2 Sep 6 02:36:59 ny01 sshd[1729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.21.68 |
2019-09-06 14:51:18 |
| 46.173.211.203 | attackspambots | " " |
2019-09-06 14:46:34 |
| 221.132.17.81 | attack | Sep 6 09:06:18 core sshd[24256]: Invalid user ftptest from 221.132.17.81 port 41606 Sep 6 09:06:20 core sshd[24256]: Failed password for invalid user ftptest from 221.132.17.81 port 41606 ssh2 ... |
2019-09-06 15:22:10 |
| 125.215.207.40 | attackbots | Sep 6 09:54:26 hosting sshd[23739]: Invalid user chris from 125.215.207.40 port 58117 ... |
2019-09-06 14:57:45 |