城市(city): unknown
省份(region): unknown
国家(country): South Korea
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): KOREACENTER
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.129.134.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44855
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.129.134.77. IN A
;; AUTHORITY SECTION:
. 1855 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062600 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 26 23:56:53 CST 2019
;; MSG SIZE rcvd: 117
Host 77.134.129.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 77.134.129.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.68.192.106 | attackspambots | Invalid user fsc from 51.68.192.106 port 48376 |
2019-10-03 13:14:47 |
| 119.57.103.38 | attackbotsspam | Oct 3 10:50:12 itv-usvr-01 sshd[22936]: Invalid user mahagon from 119.57.103.38 Oct 3 10:50:12 itv-usvr-01 sshd[22936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.57.103.38 Oct 3 10:50:12 itv-usvr-01 sshd[22936]: Invalid user mahagon from 119.57.103.38 Oct 3 10:50:14 itv-usvr-01 sshd[22936]: Failed password for invalid user mahagon from 119.57.103.38 port 48842 ssh2 Oct 3 10:59:22 itv-usvr-01 sshd[23253]: Invalid user jairo from 119.57.103.38 |
2019-10-03 12:49:54 |
| 220.225.126.55 | attack | Oct 3 07:00:44 MK-Soft-VM7 sshd[29001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55 Oct 3 07:00:46 MK-Soft-VM7 sshd[29001]: Failed password for invalid user zhou from 220.225.126.55 port 32892 ssh2 ... |
2019-10-03 13:03:24 |
| 115.94.140.243 | attack | Oct 3 07:06:52 lnxweb62 sshd[14528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.140.243 |
2019-10-03 13:14:19 |
| 223.197.250.72 | attack | 2019-08-26 11:50:33,788 fail2ban.actions [804]: NOTICE [sshd] Ban 223.197.250.72 2019-08-26 15:00:15,773 fail2ban.actions [804]: NOTICE [sshd] Ban 223.197.250.72 2019-08-26 18:22:05,249 fail2ban.actions [804]: NOTICE [sshd] Ban 223.197.250.72 ... |
2019-10-03 13:43:41 |
| 142.93.187.58 | attackspambots | 2019-09-01 18:18:50,942 fail2ban.actions [804]: NOTICE [sshd] Ban 142.93.187.58 2019-09-01 21:24:15,574 fail2ban.actions [804]: NOTICE [sshd] Ban 142.93.187.58 2019-09-02 00:29:44,093 fail2ban.actions [804]: NOTICE [sshd] Ban 142.93.187.58 ... |
2019-10-03 13:45:35 |
| 134.175.192.246 | attackspambots | [Mon Sep 30 21:17:08 2019] Failed password for r.r from 134.175.192.246 port 33900 ssh2 [Mon Sep 30 21:17:14 2019] Failed password for r.r from 134.175.192.246 port 34028 ssh2 [Mon Sep 30 21:17:19 2019] Failed password for r.r from 134.175.192.246 port 34108 ssh2 [Mon Sep 30 21:17:24 2019] Failed password for r.r from 134.175.192.246 port 34212 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=134.175.192.246 |
2019-10-03 13:17:21 |
| 94.101.95.240 | attackspam | xmlrpc attack |
2019-10-03 13:23:11 |
| 46.38.144.202 | attackbotsspam | Oct 3 06:47:24 vmanager6029 postfix/smtpd\[14004\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 06:49:56 vmanager6029 postfix/smtpd\[14004\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-10-03 12:56:27 |
| 45.55.42.17 | attack | 2019-10-03T10:58:56.518855enmeeting.mahidol.ac.th sshd\[7514\]: Invalid user applmgr from 45.55.42.17 port 38382 2019-10-03T10:58:56.534145enmeeting.mahidol.ac.th sshd\[7514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.42.17 2019-10-03T10:58:58.892132enmeeting.mahidol.ac.th sshd\[7514\]: Failed password for invalid user applmgr from 45.55.42.17 port 38382 ssh2 ... |
2019-10-03 13:21:54 |
| 191.209.113.185 | attackbots | Sep 30 13:18:00 uapps sshd[9312]: Address 191.209.113.185 maps to 191-209-113-185.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 30 13:18:03 uapps sshd[9312]: Failed password for invalid user cyril from 191.209.113.185 port 22256 ssh2 Sep 30 13:18:03 uapps sshd[9312]: Received disconnect from 191.209.113.185: 11: Bye Bye [preauth] Sep 30 13:33:09 uapps sshd[9419]: Address 191.209.113.185 maps to 191-209-113-185.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 30 13:33:11 uapps sshd[9419]: Failed password for invalid user dan from 191.209.113.185 port 29457 ssh2 Sep 30 13:33:11 uapps sshd[9419]: Received disconnect from 191.209.113.185: 11: Bye Bye [preauth] Sep 30 13:38:03 uapps sshd[9450]: Address 191.209.113.185 maps to 191-209-113-185.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! ........ ----------------------------------------------- https://www.blocklist.de/en/v |
2019-10-03 13:04:54 |
| 59.52.97.130 | attack | Oct 2 18:58:14 auw2 sshd\[2958\]: Invalid user pswd from 59.52.97.130 Oct 2 18:58:14 auw2 sshd\[2958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.52.97.130 Oct 2 18:58:16 auw2 sshd\[2958\]: Failed password for invalid user pswd from 59.52.97.130 port 35015 ssh2 Oct 2 19:03:39 auw2 sshd\[3402\]: Invalid user bnjoroge123 from 59.52.97.130 Oct 2 19:03:39 auw2 sshd\[3402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.52.97.130 |
2019-10-03 13:08:24 |
| 45.55.233.213 | attack | Oct 3 06:59:16 vps647732 sshd[3442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213 Oct 3 06:59:18 vps647732 sshd[3442]: Failed password for invalid user qg from 45.55.233.213 port 35086 ssh2 ... |
2019-10-03 13:07:21 |
| 51.89.164.224 | attackspam | Oct 3 07:08:00 vps691689 sshd[18850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.224 Oct 3 07:08:02 vps691689 sshd[18850]: Failed password for invalid user everett from 51.89.164.224 port 37403 ssh2 ... |
2019-10-03 13:25:14 |
| 79.179.141.175 | attackbots | Oct 3 06:10:34 markkoudstaal sshd[26377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.179.141.175 Oct 3 06:10:35 markkoudstaal sshd[26377]: Failed password for invalid user dspace from 79.179.141.175 port 45380 ssh2 Oct 3 06:20:15 markkoudstaal sshd[27162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.179.141.175 |
2019-10-03 12:49:15 |