城市(city): Kolkata
省份(region): West Bengal
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.139.222.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.139.222.74. IN A
;; AUTHORITY SECTION:
. 127 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:47:50 CST 2023
;; MSG SIZE rcvd: 106
Host 74.222.139.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.222.139.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.78.28.68 | attack | k+ssh-bruteforce |
2020-06-22 12:33:56 |
| 198.23.148.137 | attackbotsspam | Jun 21 18:52:30 sachi sshd\[9408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.148.137 user=mysql Jun 21 18:52:32 sachi sshd\[9408\]: Failed password for mysql from 198.23.148.137 port 49252 ssh2 Jun 21 18:55:35 sachi sshd\[9702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.148.137 user=root Jun 21 18:55:37 sachi sshd\[9702\]: Failed password for root from 198.23.148.137 port 50810 ssh2 Jun 21 18:58:45 sachi sshd\[10080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.148.137 user=root |
2020-06-22 13:04:33 |
| 68.69.167.149 | attack | *Port Scan* detected from 68.69.167.149 (US/United States/Utah/Springville/68-69-167-149.utopia.xmission.net). 4 hits in the last 30 seconds |
2020-06-22 12:44:52 |
| 14.170.5.42 | attackbots | 1592798097 - 06/22/2020 05:54:57 Host: 14.170.5.42/14.170.5.42 Port: 445 TCP Blocked |
2020-06-22 12:59:51 |
| 67.205.158.241 | attackbotsspam | (sshd) Failed SSH login from 67.205.158.241 (US/United States/New Jersey/North Bergen/-/[AS14061 DIGITALOCEAN-ASN]): 10 in the last 3600 secs |
2020-06-22 12:41:52 |
| 51.178.182.35 | attackspambots | SSH brute-force attempt |
2020-06-22 12:34:35 |
| 104.131.157.96 | attackspam | *Port Scan* detected from 104.131.157.96 (US/United States/California/San Francisco/-). 4 hits in the last 185 seconds |
2020-06-22 12:56:28 |
| 49.233.26.75 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-06-22 12:28:36 |
| 111.12.60.50 | attack | Port probing on unauthorized port 14584 |
2020-06-22 12:48:34 |
| 106.13.126.15 | attackbots | Jun 22 06:14:42 OPSO sshd\[816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 user=root Jun 22 06:14:44 OPSO sshd\[816\]: Failed password for root from 106.13.126.15 port 33896 ssh2 Jun 22 06:18:03 OPSO sshd\[1601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 user=root Jun 22 06:18:05 OPSO sshd\[1601\]: Failed password for root from 106.13.126.15 port 51060 ssh2 Jun 22 06:21:41 OPSO sshd\[2368\]: Invalid user linda from 106.13.126.15 port 39988 Jun 22 06:21:41 OPSO sshd\[2368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 |
2020-06-22 12:53:33 |
| 194.26.29.249 | attackbots | Persistent port scanning [45 denied] |
2020-06-22 12:59:28 |
| 119.29.16.190 | attackbotsspam | 2020-06-22T03:29:04.460907randservbullet-proofcloud-66.localdomain sshd[14639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.190 user=root 2020-06-22T03:29:06.738356randservbullet-proofcloud-66.localdomain sshd[14639]: Failed password for root from 119.29.16.190 port 47629 ssh2 2020-06-22T03:55:03.320868randservbullet-proofcloud-66.localdomain sshd[14739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.190 user=root 2020-06-22T03:55:05.958889randservbullet-proofcloud-66.localdomain sshd[14739]: Failed password for root from 119.29.16.190 port 57803 ssh2 ... |
2020-06-22 12:47:59 |
| 84.17.46.228 | attackspam | (From augusta.grieve@yahoo.com) Hi, I was just visiting your site and filled out your "contact us" form. The contact page on your site sends you these messages to your email account which is the reason you're reading my message right now right? This is half the battle with any type of online ad, getting people to actually READ your ad and I did that just now with you! If you have an advertisement you would like to blast out to thousands of websites via their contact forms in the U.S. or to any country worldwide send me a quick note now, I can even focus on particular niches and my prices are very reasonable. Send a reply to: Bobue67hasy57@gmail.com I want to terminate these ad messages https://bit.ly/3aELXYU |
2020-06-22 12:34:18 |
| 150.109.99.243 | attackbotsspam | no |
2020-06-22 12:28:10 |
| 193.37.255.114 | attack | Jun 22 05:55:05 debian-2gb-nbg1-2 kernel: \[15056782.410074\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=193.37.255.114 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=120 ID=5420 PROTO=TCP SPT=29570 DPT=25565 WINDOW=45536 RES=0x00 SYN URGP=0 |
2020-06-22 12:47:27 |