城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.214.43.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;131.214.43.97. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 10:09:19 CST 2025
;; MSG SIZE rcvd: 106
Host 97.43.214.131.in-addr.arpa not found: 2(SERVFAIL)
server can't find 131.214.43.97.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 108.166.155.254 | attackbotsspam | SSH invalid-user multiple login try |
2020-07-03 22:04:57 |
| 104.218.49.181 | attack | Jun 30 05:56:04 ovpn sshd[29835]: Invalid user tomcat from 104.218.49.181 Jun 30 05:56:04 ovpn sshd[29835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.218.49.181 Jun 30 05:56:05 ovpn sshd[29835]: Failed password for invalid user tomcat from 104.218.49.181 port 56928 ssh2 Jun 30 05:56:05 ovpn sshd[29835]: Received disconnect from 104.218.49.181 port 56928:11: Bye Bye [preauth] Jun 30 05:56:05 ovpn sshd[29835]: Disconnected from 104.218.49.181 port 56928 [preauth] Jun 30 06:04:04 ovpn sshd[31717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.218.49.181 user=r.r Jun 30 06:04:06 ovpn sshd[31717]: Failed password for r.r from 104.218.49.181 port 57090 ssh2 Jun 30 06:04:06 ovpn sshd[31717]: Received disconnect from 104.218.49.181 port 57090:11: Bye Bye [preauth] Jun 30 06:04:06 ovpn sshd[31717]: Disconnected from 104.218.49.181 port 57090 [preauth] ........ ----------------------------------------------- https://www.bl |
2020-07-03 22:28:05 |
| 148.240.70.42 | attackspambots | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-03 22:24:39 |
| 125.166.177.145 | attackbots | 1593742249 - 07/03/2020 04:10:49 Host: 125.166.177.145/125.166.177.145 Port: 445 TCP Blocked |
2020-07-03 22:15:56 |
| 47.88.228.246 | attack | Jul 3 04:13:42 OPSO sshd\[18347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.88.228.246 user=root Jul 3 04:13:45 OPSO sshd\[18347\]: Failed password for root from 47.88.228.246 port 55994 ssh2 Jul 3 04:14:21 OPSO sshd\[18431\]: Invalid user marlon from 47.88.228.246 port 36528 Jul 3 04:14:21 OPSO sshd\[18431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.88.228.246 Jul 3 04:14:23 OPSO sshd\[18431\]: Failed password for invalid user marlon from 47.88.228.246 port 36528 ssh2 |
2020-07-03 22:10:44 |
| 206.189.24.40 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-03T13:32:43Z and 2020-07-03T13:36:08Z |
2020-07-03 22:38:24 |
| 177.189.209.143 | attack | Jul 3 04:15:38 lnxded64 sshd[13883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.209.143 |
2020-07-03 22:01:17 |
| 112.85.42.89 | attackspambots | Jul 3 15:43:30 piServer sshd[18045]: Failed password for root from 112.85.42.89 port 61575 ssh2 Jul 3 15:43:33 piServer sshd[18045]: Failed password for root from 112.85.42.89 port 61575 ssh2 Jul 3 15:43:36 piServer sshd[18045]: Failed password for root from 112.85.42.89 port 61575 ssh2 ... |
2020-07-03 22:19:50 |
| 69.162.74.166 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2020-07-03 22:01:52 |
| 113.116.23.196 | attack | 1593742304 - 07/03/2020 04:11:44 Host: 113.116.23.196/113.116.23.196 Port: 445 TCP Blocked |
2020-07-03 22:07:53 |
| 209.85.220.69 | attackspam | Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69])
by mx.google.com with SMTPS id t185sor8394064qkb.21.2020.07.03.05.36.11
for <> (Google Transport Security);
Fri, 03 Jul 2020 05:36:12 -0700 (PDT)
JohnAudioTech just uploaded a video
How to select audio amplifier input decoupling capacitor value
http://www.youtube.com/watch?v=xzORxnIpbCs&feature=em-uploademail
John N Nay in Vandalia, OH
Current address Po Box 362, Vandalia, OH 45377
5064 Santa Fe Dr, Dayton, OH 45414
5062 Santa Fe Dr, Dayton, OH 45414
3505 Village Dr, APT H, Franklin, OH 45005
Santa Fe Dr, Dayton, OH 45414
Current Phone (513) 237-9459
Previous Phones
(937) 422-1162
(937) 237-9459
(513) 422-1162 |
2020-07-03 22:12:02 |
| 35.208.87.56 | attackbotsspam | Fail2Ban Ban Triggered (2) |
2020-07-03 22:16:21 |
| 122.51.32.91 | attackbotsspam | Jun 30 07:06:17 online-web-1 sshd[2007916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.32.91 user=r.r Jun 30 07:06:19 online-web-1 sshd[2007916]: Failed password for r.r from 122.51.32.91 port 58846 ssh2 Jun 30 07:06:19 online-web-1 sshd[2007916]: Received disconnect from 122.51.32.91 port 58846:11: Bye Bye [preauth] Jun 30 07:06:19 online-web-1 sshd[2007916]: Disconnected from 122.51.32.91 port 58846 [preauth] Jun 30 07:21:01 online-web-1 sshd[2009018]: Invalid user sqoop from 122.51.32.91 port 57298 Jun 30 07:21:01 online-web-1 sshd[2009018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.32.91 Jun 30 07:21:03 online-web-1 sshd[2009018]: Failed password for invalid user sqoop from 122.51.32.91 port 57298 ssh2 Jun 30 07:21:04 online-web-1 sshd[2009018]: Received disconnect from 122.51.32.91 port 57298:11: Bye Bye [preauth] Jun 30 07:21:04 online-web-1 sshd[2009018]: Dis........ ------------------------------- |
2020-07-03 22:33:17 |
| 213.6.130.133 | attackbots | Jul 3 04:15:41 sso sshd[14547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.130.133 Jul 3 04:15:42 sso sshd[14547]: Failed password for invalid user winch from 213.6.130.133 port 38626 ssh2 ... |
2020-07-03 21:59:32 |
| 14.185.23.239 | attackspambots | 1593742381 - 07/03/2020 04:13:01 Host: 14.185.23.239/14.185.23.239 Port: 445 TCP Blocked |
2020-07-03 22:03:02 |