城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.16.149.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.16.149.132. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:46:31 CST 2022
;; MSG SIZE rcvd: 106
Host 132.149.16.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 132.149.16.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.90.50.242 | attack | Honeypot attack, port: 445, PTR: bkbrasil-G2-0-2-142-iacc01.cas.embratel.net.br. |
2020-09-07 05:42:15 |
| 118.24.7.98 | attackspambots | SSH login attempts. |
2020-09-07 05:48:00 |
| 141.98.10.214 | attackbots | Sep 6 19:01:30 dns1 sshd[2581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214 Sep 6 19:01:32 dns1 sshd[2581]: Failed password for invalid user admin from 141.98.10.214 port 46661 ssh2 Sep 6 19:02:09 dns1 sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.214 |
2020-09-07 06:03:23 |
| 88.121.22.235 | attackbotsspam | Sep 6 21:30:05 serwer sshd\[14723\]: Invalid user ubuntu from 88.121.22.235 port 55181 Sep 6 21:30:05 serwer sshd\[14723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.22.235 Sep 6 21:30:07 serwer sshd\[14723\]: Failed password for invalid user ubuntu from 88.121.22.235 port 55181 ssh2 ... |
2020-09-07 05:47:08 |
| 83.208.253.10 | attackbotsspam | Automatic report - Banned IP Access |
2020-09-07 05:59:24 |
| 103.10.227.176 | attackbots | DDOS |
2020-09-07 06:04:11 |
| 173.252.95.35 | attack | [Sun Sep 06 23:53:54.625273 2020] [:error] [pid 31435:tid 140397542881024] [client 173.252.95.35:42156] [client 173.252.95.35] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/depan/service-worker-v4.js"] [unique_id "X1UUIqKFltyTD6lc4lcewAAAOwQ"], referer: https://karangploso.jatim.bmkg.go.id/depan/service-worker-v4.js ... |
2020-09-07 05:53:17 |
| 141.98.9.163 | attackbotsspam | Brute-force attempt banned |
2020-09-07 05:33:09 |
| 47.6.104.214 | attackspam | SSH login attempts. |
2020-09-07 05:51:31 |
| 192.71.3.26 | attackspambots | Multiple 404 errors on a honeypot website |
2020-09-07 06:00:32 |
| 106.53.2.215 | attackbots | Sep 6 20:47:53 MainVPS sshd[6623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.215 user=root Sep 6 20:47:56 MainVPS sshd[6623]: Failed password for root from 106.53.2.215 port 56580 ssh2 Sep 6 20:49:44 MainVPS sshd[9723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.215 user=root Sep 6 20:49:46 MainVPS sshd[9723]: Failed password for root from 106.53.2.215 port 47504 ssh2 Sep 6 20:51:31 MainVPS sshd[13162]: Invalid user doncell from 106.53.2.215 port 38432 ... |
2020-09-07 06:04:33 |
| 186.37.84.198 | attack | Sep 6 19:50:34 pkdns2 sshd\[28951\]: Failed password for root from 186.37.84.198 port 58904 ssh2Sep 6 19:52:10 pkdns2 sshd\[29010\]: Failed password for root from 186.37.84.198 port 43562 ssh2Sep 6 19:53:50 pkdns2 sshd\[29056\]: Invalid user web1 from 186.37.84.198Sep 6 19:53:52 pkdns2 sshd\[29056\]: Failed password for invalid user web1 from 186.37.84.198 port 56490 ssh2Sep 6 19:55:31 pkdns2 sshd\[29167\]: Failed password for root from 186.37.84.198 port 41160 ssh2Sep 6 19:57:08 pkdns2 sshd\[29222\]: Failed password for root from 186.37.84.198 port 54030 ssh2 ... |
2020-09-07 05:46:32 |
| 106.12.59.23 | attackbots | SSH BruteForce Attack |
2020-09-07 05:49:38 |
| 116.100.90.227 | attack | Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn. |
2020-09-07 06:01:47 |
| 171.221.150.182 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-07 05:37:25 |