城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.97.45.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.97.45.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 21:48:54 CST 2025
;; MSG SIZE rcvd: 105
Host 14.45.97.136.in-addr.arpa not found: 2(SERVFAIL)
server can't find 136.97.45.14.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 149.56.23.154 | attack | 2019-08-28T06:45:31.001762abusebot-4.cloudsearch.cf sshd\[19107\]: Invalid user mai from 149.56.23.154 port 39488 |
2019-08-28 16:29:17 |
| 157.230.210.167 | attackbotsspam | *Port Scan* detected from 157.230.210.167 (US/United States/-). 4 hits in the last 20 seconds |
2019-08-28 16:38:46 |
| 46.229.168.139 | attackspambots | Malicious Traffic/Form Submission |
2019-08-28 16:49:42 |
| 163.172.28.183 | attack | web-1 [ssh_2] SSH Attack |
2019-08-28 16:21:50 |
| 198.98.56.41 | attackspambots | Wed 28 03:49:05 123/udp |
2019-08-28 16:05:21 |
| 112.134.44.153 | attack | B: /wp-login.php attack |
2019-08-28 16:19:29 |
| 54.36.148.209 | attackspam | Automatic report - Banned IP Access |
2019-08-28 16:48:00 |
| 92.63.194.90 | attack | 2019-08-28T15:31:18.477853enmeeting.mahidol.ac.th sshd\[5371\]: Invalid user admin from 92.63.194.90 port 56268 2019-08-28T15:31:18.495998enmeeting.mahidol.ac.th sshd\[5371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90 2019-08-28T15:31:20.911896enmeeting.mahidol.ac.th sshd\[5371\]: Failed password for invalid user admin from 92.63.194.90 port 56268 ssh2 ... |
2019-08-28 16:42:16 |
| 119.166.175.141 | attackspambots | Unauthorised access (Aug 28) SRC=119.166.175.141 LEN=40 TTL=49 ID=27457 TCP DPT=8080 WINDOW=40092 SYN Unauthorised access (Aug 28) SRC=119.166.175.141 LEN=40 TTL=49 ID=528 TCP DPT=8080 WINDOW=60140 SYN |
2019-08-28 16:12:22 |
| 104.199.174.199 | attack | Aug 27 19:26:52 lcdev sshd\[18957\]: Invalid user password123 from 104.199.174.199 Aug 27 19:26:52 lcdev sshd\[18957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.174.199.104.bc.googleusercontent.com Aug 27 19:26:54 lcdev sshd\[18957\]: Failed password for invalid user password123 from 104.199.174.199 port 50664 ssh2 Aug 27 19:31:09 lcdev sshd\[19351\]: Invalid user martinez from 104.199.174.199 Aug 27 19:31:09 lcdev sshd\[19351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.174.199.104.bc.googleusercontent.com |
2019-08-28 16:51:47 |
| 167.114.192.162 | attackspambots | Aug 27 01:56:15 itv-usvr-01 sshd[25510]: Invalid user opc from 167.114.192.162 Aug 27 01:56:15 itv-usvr-01 sshd[25510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.192.162 Aug 27 01:56:15 itv-usvr-01 sshd[25510]: Invalid user opc from 167.114.192.162 Aug 27 01:56:16 itv-usvr-01 sshd[25510]: Failed password for invalid user opc from 167.114.192.162 port 20143 ssh2 Aug 27 02:01:17 itv-usvr-01 sshd[25766]: Invalid user popsvr from 167.114.192.162 |
2019-08-28 16:40:30 |
| 106.13.197.115 | attackspambots | Aug 27 07:04:23 rb06 sshd[8850]: Failed password for invalid user newadmin from 106.13.197.115 port 44430 ssh2 Aug 27 07:04:24 rb06 sshd[8850]: Received disconnect from 106.13.197.115: 11: Bye Bye [preauth] Aug 27 07:09:31 rb06 sshd[9910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.197.115 user=r.r Aug 27 07:09:33 rb06 sshd[9910]: Failed password for r.r from 106.13.197.115 port 56502 ssh2 Aug 27 07:09:34 rb06 sshd[9910]: Received disconnect from 106.13.197.115: 11: Bye Bye [preauth] Aug 27 07:14:36 rb06 sshd[14332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.197.115 user=r.r Aug 27 07:14:38 rb06 sshd[14332]: Failed password for r.r from 106.13.197.115 port 40308 ssh2 Aug 27 07:14:38 rb06 sshd[14332]: Received disconnect from 106.13.197.115: 11: Bye Bye [preauth] Aug 27 07:19:41 rb06 sshd[15246]: Failed password for invalid user mathandazo from 106.13.197.115 port 5........ ------------------------------- |
2019-08-28 16:33:53 |
| 201.214.114.205 | attackbotsspam | Invalid user auser from 201.214.114.205 port 36516 |
2019-08-28 16:24:54 |
| 27.254.90.106 | attackbotsspam | Aug 27 20:06:38 web1 sshd\[20372\]: Invalid user calice from 27.254.90.106 Aug 27 20:06:38 web1 sshd\[20372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.90.106 Aug 27 20:06:40 web1 sshd\[20372\]: Failed password for invalid user calice from 27.254.90.106 port 60350 ssh2 Aug 27 20:11:43 web1 sshd\[20892\]: Invalid user zori from 27.254.90.106 Aug 27 20:11:43 web1 sshd\[20892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.90.106 |
2019-08-28 16:10:10 |
| 159.203.122.149 | attackbots | Invalid user kay from 159.203.122.149 port 46390 |
2019-08-28 16:59:28 |