城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.199.189.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.199.189.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 11:37:26 CST 2025
;; MSG SIZE rcvd: 107
14.189.199.138.in-addr.arpa domain name pointer static.14.189.199.138.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.189.199.138.in-addr.arpa name = static.14.189.199.138.clients.your-server.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.119.54.217 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 01-01-2020 14:45:09. |
2020-01-02 04:22:48 |
| 27.150.31.153 | attackspam | Dec 30 06:04:14 h1946882 sshd[16610]: pam_unix(sshd:auth): authenticati= on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D27.1= 50.31.153 user=3Dr.r Dec 30 06:04:16 h1946882 sshd[16610]: Failed password for r.r from 27.= 150.31.153 port 50690 ssh2 Dec 30 06:04:16 h1946882 sshd[16610]: Received disconnect from 27.150.3= 1.153: 11: Bye Bye [preauth] Dec 30 06:13:14 h1946882 sshd[16744]: pam_unix(sshd:auth): authenticati= on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D27.1= 50.31.153 user=3Dr.r Dec 30 06:13:15 h1946882 sshd[16744]: Failed password for r.r from 27.= 150.31.153 port 46938 ssh2 Dec 30 06:13:16 h1946882 sshd[16744]: Received disconnect from 27.150.3= 1.153: 11: Bye Bye [preauth] Dec 30 06:16:26 h1946882 sshd[16773]: pam_unix(sshd:auth): authenticati= on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D27.1= 50.31.153 user=3Dr.r Dec 30 06:16:28 h1946882 sshd[16773]: Failed password for r.r from 27.= 150.31........ ------------------------------- |
2020-01-02 04:31:53 |
| 37.187.54.45 | attackbots | 2020-01-01T20:04:05.492721abusebot-5.cloudsearch.cf sshd[15153]: Invalid user sothmann from 37.187.54.45 port 38366 2020-01-01T20:04:05.503775abusebot-5.cloudsearch.cf sshd[15153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-37-187-54.eu 2020-01-01T20:04:05.492721abusebot-5.cloudsearch.cf sshd[15153]: Invalid user sothmann from 37.187.54.45 port 38366 2020-01-01T20:04:07.461624abusebot-5.cloudsearch.cf sshd[15153]: Failed password for invalid user sothmann from 37.187.54.45 port 38366 ssh2 2020-01-01T20:06:45.774759abusebot-5.cloudsearch.cf sshd[15196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-37-187-54.eu user=root 2020-01-01T20:06:48.033957abusebot-5.cloudsearch.cf sshd[15196]: Failed password for root from 37.187.54.45 port 39796 ssh2 2020-01-01T20:10:08.011336abusebot-5.cloudsearch.cf sshd[15203]: Invalid user wwwadmin from 37.187.54.45 port 41224 ... |
2020-01-02 04:11:45 |
| 101.89.110.204 | attack | 2020-01-01T14:39:04.272092abusebot-7.cloudsearch.cf sshd[31264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.110.204 user=root 2020-01-01T14:39:06.414284abusebot-7.cloudsearch.cf sshd[31264]: Failed password for root from 101.89.110.204 port 48546 ssh2 2020-01-01T14:42:10.439552abusebot-7.cloudsearch.cf sshd[31420]: Invalid user dovecot from 101.89.110.204 port 38364 2020-01-01T14:42:10.445450abusebot-7.cloudsearch.cf sshd[31420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.110.204 2020-01-01T14:42:10.439552abusebot-7.cloudsearch.cf sshd[31420]: Invalid user dovecot from 101.89.110.204 port 38364 2020-01-01T14:42:12.121105abusebot-7.cloudsearch.cf sshd[31420]: Failed password for invalid user dovecot from 101.89.110.204 port 38364 ssh2 2020-01-01T14:45:24.441508abusebot-7.cloudsearch.cf sshd[31671]: Invalid user lauralynn from 101.89.110.204 port 56448 ... |
2020-01-02 04:11:05 |
| 185.238.44.212 | attackspambots | Dec 31 04:26:16 our-server-hostname postfix/smtpd[15026]: connect from unknown[185.238.44.212] Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=185.238.44.212 |
2020-01-02 04:43:58 |
| 185.253.96.23 | attack | 0,17-13/07 [bc01/m09] PostRequest-Spammer scoring: nairobi |
2020-01-02 04:24:43 |
| 124.156.197.29 | attackspam | firewall-block, port(s): 70/tcp |
2020-01-02 04:32:34 |
| 14.226.84.151 | attackspambots | Unauthorised access (Jan 1) SRC=14.226.84.151 LEN=44 PREC=0x20 TTL=245 ID=45857 TCP DPT=445 WINDOW=1024 SYN |
2020-01-02 04:28:49 |
| 162.241.149.130 | attackbots | SSH bruteforce (Triggered fail2ban) |
2020-01-02 04:15:29 |
| 138.94.115.198 | attack | Unauthorized connection attempt from IP address 138.94.115.198 on Port 445(SMB) |
2020-01-02 04:14:43 |
| 180.251.8.29 | attack | 1577900589 - 01/01/2020 18:43:09 Host: 180.251.8.29/180.251.8.29 Port: 445 TCP Blocked |
2020-01-02 04:29:03 |
| 103.99.150.130 | attackbotsspam | Unauthorized connection attempt from IP address 103.99.150.130 on Port 445(SMB) |
2020-01-02 04:11:28 |
| 46.101.104.225 | attackbots | The IP has triggered Cloudflare WAF. CF-Ray: 54e35ffcfafcdfb7 | WAF_Rule_ID: a75424b44a1e4f27881d03344a122815 | WAF_Kind: firewall | CF_Action: drop | Country: DE | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: lab.skk.moe | User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 | CF_DC: FRA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-01-02 04:12:14 |
| 95.81.116.100 | attack | Unauthorized connection attempt from IP address 95.81.116.100 on Port 445(SMB) |
2020-01-02 04:25:12 |
| 208.100.26.241 | attackspam | Jan 1 21:27:00 debian-2gb-nbg1-2 kernel: \[169751.300340\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=208.100.26.241 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=32553 PROTO=TCP SPT=50098 DPT=5222 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-02 04:29:29 |