城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.106.106.92 | attackbots | Unauthorized connection attempt detected from IP address 14.106.106.92 to port 6656 [T] |
2020-01-30 08:54:12 |
| 14.106.106.249 | attackbotsspam | badbot |
2019-11-17 14:25:42 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.106.106.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.106.106.139. IN A
;; AUTHORITY SECTION:
. 443 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:47:00 CST 2022
;; MSG SIZE rcvd: 107
Host 139.106.106.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.106.106.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.248.160.150 | attackspam | 757/tcp 537/tcp 631/tcp... [2019-07-08/09-08]17854pkt,5994pt.(tcp) |
2019-09-09 09:00:41 |
| 212.227.136.209 | attackspam | Sep 8 20:27:41 ny01 sshd[17013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.227.136.209 Sep 8 20:27:43 ny01 sshd[17013]: Failed password for invalid user xguest from 212.227.136.209 port 41938 ssh2 Sep 8 20:32:17 ny01 sshd[17906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.227.136.209 |
2019-09-09 08:40:07 |
| 66.183.127.247 | attackspam | Sep 8 20:46:30 vps200512 sshd\[31127\]: Invalid user proxyuser from 66.183.127.247 Sep 8 20:46:30 vps200512 sshd\[31127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.183.127.247 Sep 8 20:46:31 vps200512 sshd\[31127\]: Failed password for invalid user proxyuser from 66.183.127.247 port 56838 ssh2 Sep 8 20:50:45 vps200512 sshd\[31185\]: Invalid user sdtdserver from 66.183.127.247 Sep 8 20:50:45 vps200512 sshd\[31185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.183.127.247 |
2019-09-09 08:54:13 |
| 134.209.35.183 | attack | Sep 9 02:14:19 h2177944 sshd\[21324\]: Invalid user tester from 134.209.35.183 port 43680 Sep 9 02:14:19 h2177944 sshd\[21324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.35.183 Sep 9 02:14:21 h2177944 sshd\[21324\]: Failed password for invalid user tester from 134.209.35.183 port 43680 ssh2 Sep 9 02:21:24 h2177944 sshd\[21578\]: Invalid user dspace from 134.209.35.183 port 33405 ... |
2019-09-09 08:39:07 |
| 104.236.28.167 | attack | Invalid user user from 104.236.28.167 port 60312 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.28.167 Failed password for invalid user user from 104.236.28.167 port 60312 ssh2 Invalid user teamspeak3 from 104.236.28.167 port 37156 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.28.167 |
2019-09-09 08:17:49 |
| 51.91.249.91 | attack | Invalid user user@123 from 51.91.249.91 port 50250 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.249.91 Failed password for invalid user user@123 from 51.91.249.91 port 50250 ssh2 Invalid user 12345 from 51.91.249.91 port 54188 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.249.91 |
2019-09-09 08:58:29 |
| 138.197.199.249 | attackspam | Sep 8 09:55:31 aiointranet sshd\[25030\]: Invalid user vagrant from 138.197.199.249 Sep 8 09:55:31 aiointranet sshd\[25030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.199.249 Sep 8 09:55:33 aiointranet sshd\[25030\]: Failed password for invalid user vagrant from 138.197.199.249 port 58486 ssh2 Sep 8 09:59:31 aiointranet sshd\[25342\]: Invalid user vbox@123 from 138.197.199.249 Sep 8 09:59:31 aiointranet sshd\[25342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.199.249 |
2019-09-09 08:57:35 |
| 37.195.205.135 | attack | Sep 8 14:02:25 auw2 sshd\[21033\]: Invalid user 123456 from 37.195.205.135 Sep 8 14:02:25 auw2 sshd\[21033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-195-205-135.novotelecom.ru Sep 8 14:02:27 auw2 sshd\[21033\]: Failed password for invalid user 123456 from 37.195.205.135 port 55496 ssh2 Sep 8 14:07:05 auw2 sshd\[21478\]: Invalid user web from 37.195.205.135 Sep 8 14:07:05 auw2 sshd\[21478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l37-195-205-135.novotelecom.ru |
2019-09-09 08:24:17 |
| 67.166.254.205 | attack | Sep 9 05:24:13 areeb-Workstation sshd[16467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.166.254.205 Sep 9 05:24:15 areeb-Workstation sshd[16467]: Failed password for invalid user asdf from 67.166.254.205 port 48588 ssh2 ... |
2019-09-09 08:42:04 |
| 151.54.147.67 | attackbots | Automatic report - Port Scan Attack |
2019-09-09 08:27:41 |
| 139.59.61.134 | attackspam | SSH Bruteforce attempt |
2019-09-09 08:47:00 |
| 51.75.120.244 | attackbotsspam | Sep 9 02:34:56 SilenceServices sshd[7798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.120.244 Sep 9 02:34:58 SilenceServices sshd[7798]: Failed password for invalid user webpass from 51.75.120.244 port 57372 ssh2 Sep 9 02:40:11 SilenceServices sshd[11679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.120.244 |
2019-09-09 08:42:20 |
| 198.50.152.30 | attack | 445/tcp 445/tcp 445/tcp... [2019-07-08/09-08]9pkt,1pt.(tcp) |
2019-09-09 08:48:52 |
| 193.56.29.126 | attack | *Port Scan* detected from 193.56.29.126 (GB/United Kingdom/-). 4 hits in the last 85 seconds |
2019-09-09 08:43:38 |
| 191.113.24.233 | attackbots | port scan/probe/communication attempt |
2019-09-09 08:55:56 |