城市(city): Ho Chi Minh City
省份(region): Ho Chi Minh
国家(country): Vietnam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.161.50.104 | attack | 2020-10-07T06:48:13.047894dreamphreak.com sshd[554015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.50.104 user=root 2020-10-07T06:48:15.162378dreamphreak.com sshd[554015]: Failed password for root from 14.161.50.104 port 58765 ssh2 ... |
2020-10-08 01:29:38 |
| 14.161.50.104 | attackspam | Oct 7 10:53:04 pkdns2 sshd\[10012\]: Address 14.161.50.104 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 7 10:53:06 pkdns2 sshd\[10012\]: Failed password for root from 14.161.50.104 port 34835 ssh2Oct 7 10:56:53 pkdns2 sshd\[10205\]: Address 14.161.50.104 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 7 10:56:55 pkdns2 sshd\[10205\]: Failed password for root from 14.161.50.104 port 63005 ssh2Oct 7 11:00:36 pkdns2 sshd\[10418\]: Address 14.161.50.104 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 7 11:00:38 pkdns2 sshd\[10418\]: Failed password for root from 14.161.50.104 port 58409 ssh2 ... |
2020-10-07 17:37:23 |
| 14.161.50.104 | attack | ... |
2020-09-06 23:46:40 |
| 14.161.50.104 | attackbots | Sep 6 08:55:06 * sshd[5131]: Failed password for root from 14.161.50.104 port 56331 ssh2 |
2020-09-06 15:10:20 |
| 14.161.50.104 | attack | $f2bV_matches |
2020-09-06 07:13:26 |
| 14.161.5.70 | attack | Dovecot Invalid User Login Attempt. |
2020-08-24 20:37:32 |
| 14.161.50.104 | attackbots | Jun 28 12:12:55 vps1 sshd[1993270]: Invalid user csw from 14.161.50.104 port 35781 Jun 28 12:12:57 vps1 sshd[1993270]: Failed password for invalid user csw from 14.161.50.104 port 35781 ssh2 ... |
2020-06-28 22:54:08 |
| 14.161.5.229 | attackbots | $f2bV_matches |
2020-06-01 15:05:23 |
| 14.161.50.104 | attack | 2020-05-14T22:57:15.991767linuxbox-skyline sshd[8123]: Invalid user jack from 14.161.50.104 port 51263 ... |
2020-05-15 13:02:27 |
| 14.161.50.104 | attack | May 14 01:24:43 ns392434 sshd[8176]: Invalid user ubuntu from 14.161.50.104 port 36219 May 14 01:24:43 ns392434 sshd[8176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.50.104 May 14 01:24:43 ns392434 sshd[8176]: Invalid user ubuntu from 14.161.50.104 port 36219 May 14 01:24:45 ns392434 sshd[8176]: Failed password for invalid user ubuntu from 14.161.50.104 port 36219 ssh2 May 14 01:28:23 ns392434 sshd[8280]: Invalid user bob from 14.161.50.104 port 34495 May 14 01:28:23 ns392434 sshd[8280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.50.104 May 14 01:28:23 ns392434 sshd[8280]: Invalid user bob from 14.161.50.104 port 34495 May 14 01:28:26 ns392434 sshd[8280]: Failed password for invalid user bob from 14.161.50.104 port 34495 ssh2 May 14 01:32:12 ns392434 sshd[8325]: Invalid user lh from 14.161.50.104 port 32769 |
2020-05-14 08:11:06 |
| 14.161.50.104 | attack | May 7 00:30:01 server sshd[44779]: Failed password for invalid user atul from 14.161.50.104 port 53821 ssh2 May 7 00:50:06 server sshd[60485]: Failed password for invalid user hduser from 14.161.50.104 port 35523 ssh2 May 7 00:54:36 server sshd[63829]: Failed password for root from 14.161.50.104 port 50725 ssh2 |
2020-05-07 07:29:59 |
| 14.161.50.104 | attackbots | Invalid user ellis from 14.161.50.104 port 53265 |
2020-05-01 03:13:57 |
| 14.161.5.200 | attackspam | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-02-27 20:17:50 |
| 14.161.5.229 | attack | 2020-02-0620:55:561iznFj-0007G4-Un\<=verena@rs-solution.chH=\(localhost\)[113.177.134.102]:43992P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2268id=1613A5F6FD2907B4686D249C689E863F@rs-solution.chT="Iwantsomethingbeautiful"forluiscarrero@gmail.com2020-02-0620:56:181iznG5-0007Gv-T6\<=verena@rs-solution.chH=mx-ll-183.88.243-95.dynamic.3bb.co.th\(localhost\)[183.88.243.95]:57728P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2115id=6762D4878C5876C5191C55ED195A7CDF@rs-solution.chT="Iwantsomethingbeautiful"forlvortouni@gmail.com2020-02-0620:56:451iznGW-0007Hr-60\<=verena@rs-solution.chH=\(localhost\)[14.161.5.229]:60558P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2133id=B6B305565D89A714C8CD843CC812200D@rs-solution.chT="Iwantsomethingbeautiful"forraidergirl42557@yahoo.com2020-02-0620:55:311iznFK-0007F7-Lx\<=verena@rs-solution.chH=\(localhost\)[113.162.175.148]:52170P=e |
2020-02-07 04:22:51 |
| 14.161.5.70 | attack | Autoban 14.161.5.70 AUTH/CONNECT |
2020-01-19 01:25:55 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.161.5.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.161.5.144. IN A
;; AUTHORITY SECTION:
. 150 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021091001 1800 900 604800 86400
;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 11 11:28:05 CST 2021
;; MSG SIZE rcvd: 105
144.5.161.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
144.5.161.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 159.65.112.93 | attackspam | Jul 22 12:06:50 TORMINT sshd\[11136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93 user=root Jul 22 12:06:52 TORMINT sshd\[11136\]: Failed password for root from 159.65.112.93 port 34168 ssh2 Jul 22 12:11:19 TORMINT sshd\[11677\]: Invalid user mysql from 159.65.112.93 Jul 22 12:11:19 TORMINT sshd\[11677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93 ... |
2019-07-23 00:25:32 |
| 13.71.1.224 | attack | Jul 22 10:58:37 plusreed sshd[28252]: Invalid user admin1 from 13.71.1.224 ... |
2019-07-23 00:42:24 |
| 131.175.120.99 | attackbots | Jul 22 17:46:39 mail sshd\[9762\]: Invalid user feng from 131.175.120.99 port 46866 Jul 22 17:46:39 mail sshd\[9762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.175.120.99 Jul 22 17:46:41 mail sshd\[9762\]: Failed password for invalid user feng from 131.175.120.99 port 46866 ssh2 Jul 22 17:51:45 mail sshd\[10374\]: Invalid user support from 131.175.120.99 port 44674 Jul 22 17:51:45 mail sshd\[10374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.175.120.99 |
2019-07-23 00:03:54 |
| 92.118.37.74 | attackspam | Jul 22 16:27:26 h2177944 kernel: \[2129741.426455\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=49981 PROTO=TCP SPT=46525 DPT=42573 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 22 16:27:33 h2177944 kernel: \[2129748.419062\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18732 PROTO=TCP SPT=46525 DPT=15256 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 22 16:28:19 h2177944 kernel: \[2129794.248075\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=9156 PROTO=TCP SPT=46525 DPT=18183 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 22 16:33:40 h2177944 kernel: \[2130115.289389\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=26808 PROTO=TCP SPT=46525 DPT=38072 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 22 16:38:00 h2177944 kernel: \[2130375.314611\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 L |
2019-07-22 23:24:33 |
| 217.138.50.154 | attackbots | Jul 22 17:54:41 mail sshd\[10814\]: Invalid user user from 217.138.50.154 port 35726 Jul 22 17:54:41 mail sshd\[10814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.50.154 Jul 22 17:54:43 mail sshd\[10814\]: Failed password for invalid user user from 217.138.50.154 port 35726 ssh2 Jul 22 17:59:04 mail sshd\[11340\]: Invalid user server from 217.138.50.154 port 60878 Jul 22 17:59:04 mail sshd\[11340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.50.154 |
2019-07-23 00:02:35 |
| 191.53.221.244 | attackbots | $f2bV_matches |
2019-07-22 23:14:43 |
| 197.61.70.166 | attackbots | Jul 22 16:20:30 srv-4 sshd\[23061\]: Invalid user admin from 197.61.70.166 Jul 22 16:20:30 srv-4 sshd\[23061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.61.70.166 Jul 22 16:20:32 srv-4 sshd\[23061\]: Failed password for invalid user admin from 197.61.70.166 port 34662 ssh2 ... |
2019-07-22 23:39:13 |
| 139.99.40.27 | attackbots | Invalid user tony from 139.99.40.27 port 38576 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27 Failed password for invalid user tony from 139.99.40.27 port 38576 ssh2 Invalid user dispecer from 139.99.40.27 port 34412 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27 |
2019-07-23 00:22:22 |
| 118.97.188.105 | attackspam | 2019-07-22T15:02:57.847419abusebot-5.cloudsearch.cf sshd\[27473\]: Invalid user apple from 118.97.188.105 port 35518 |
2019-07-22 23:36:38 |
| 106.13.43.242 | attackbots | Jul 22 15:19:20 srv206 sshd[6281]: Invalid user webmaster from 106.13.43.242 Jul 22 15:19:20 srv206 sshd[6281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.43.242 Jul 22 15:19:20 srv206 sshd[6281]: Invalid user webmaster from 106.13.43.242 Jul 22 15:19:21 srv206 sshd[6281]: Failed password for invalid user webmaster from 106.13.43.242 port 40910 ssh2 ... |
2019-07-23 00:53:19 |
| 185.222.211.244 | attackspam | Jul 22 18:19:19 relay postfix/smtpd\[3688\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.244\]: 554 5.7.1 \ |
2019-07-23 00:40:25 |
| 142.93.74.45 | attackspambots | Jul 22 16:45:29 OPSO sshd\[17312\]: Invalid user jeanne from 142.93.74.45 port 40358 Jul 22 16:45:29 OPSO sshd\[17312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45 Jul 22 16:45:31 OPSO sshd\[17312\]: Failed password for invalid user jeanne from 142.93.74.45 port 40358 ssh2 Jul 22 16:50:01 OPSO sshd\[17590\]: Invalid user basesystem from 142.93.74.45 port 53886 Jul 22 16:50:01 OPSO sshd\[17590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.74.45 |
2019-07-22 23:37:57 |
| 77.233.10.37 | attackbots | 2019-07-22 08:19:31 H=(lombardianews.it) [77.233.10.37]:45448 I=[192.147.25.65]:25 F= |
2019-07-23 00:44:07 |
| 49.247.213.143 | attackspambots | Jul 22 15:17:33 MK-Soft-VM5 sshd\[30747\]: Invalid user asterisk from 49.247.213.143 port 56670 Jul 22 15:17:33 MK-Soft-VM5 sshd\[30747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.213.143 Jul 22 15:17:34 MK-Soft-VM5 sshd\[30747\]: Failed password for invalid user asterisk from 49.247.213.143 port 56670 ssh2 ... |
2019-07-22 23:19:14 |
| 117.97.154.178 | attackbots | firewall-block, port(s): 21/tcp |
2019-07-22 23:57:59 |