城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.163.42.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.163.42.57. IN A
;; AUTHORITY SECTION:
. 448 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 12 00:00:27 CST 2022
;; MSG SIZE rcvd: 105
b'57.42.163.14.in-addr.arpa domain name pointer static.vnpt.vn.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
57.42.163.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.142.94.222 | attack | Jan 16 04:47:28 Tower sshd[6804]: refused connect from 5.253.25.37 (5.253.25.37) Jan 16 16:19:40 Tower sshd[6804]: Connection from 14.142.94.222 port 57284 on 192.168.10.220 port 22 rdomain "" Jan 16 16:19:42 Tower sshd[6804]: Invalid user amit from 14.142.94.222 port 57284 Jan 16 16:19:42 Tower sshd[6804]: error: Could not get shadow information for NOUSER Jan 16 16:19:42 Tower sshd[6804]: Failed password for invalid user amit from 14.142.94.222 port 57284 ssh2 Jan 16 16:19:42 Tower sshd[6804]: Received disconnect from 14.142.94.222 port 57284:11: Bye Bye [preauth] Jan 16 16:19:42 Tower sshd[6804]: Disconnected from invalid user amit 14.142.94.222 port 57284 [preauth] |
2020-01-17 06:14:06 |
| 116.232.37.105 | attackbots | Unauthorized connection attempt detected from IP address 116.232.37.105 to port 23 [J] |
2020-01-17 06:36:49 |
| 221.230.55.115 | attackspam | Unauthorized connection attempt detected from IP address 221.230.55.115 to port 5555 [T] |
2020-01-17 06:25:15 |
| 58.64.200.176 | attackbots | firewall-block, port(s): 1433/tcp |
2020-01-17 06:06:05 |
| 203.195.177.202 | attackbotsspam | Unauthorized connection attempt detected from IP address 203.195.177.202 to port 23 [T] |
2020-01-17 06:26:53 |
| 171.38.221.156 | attackbotsspam | Unauthorized connection attempt detected from IP address 171.38.221.156 to port 23 [T] |
2020-01-17 06:30:08 |
| 164.52.36.240 | attackbotsspam | Unauthorized connection attempt detected from IP address 164.52.36.240 to port 5902 [J] |
2020-01-17 06:30:35 |
| 144.7.122.98 | attackbots | firewall-block, port(s): 3389/tcp |
2020-01-17 06:11:20 |
| 218.201.84.58 | attackspam | Unauthorized connection attempt detected from IP address 218.201.84.58 to port 23 [T] |
2020-01-17 06:26:17 |
| 111.172.166.186 | attack | Unauthorized connection attempt detected from IP address 111.172.166.186 to port 81 [T] |
2020-01-17 06:40:08 |
| 82.213.241.9 | attackbotsspam | 2020-01-16T21:19:35.601417homeassistant sshd[11529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.213.241.9 user=root 2020-01-16T21:19:37.341998homeassistant sshd[11529]: Failed password for root from 82.213.241.9 port 34590 ssh2 ... |
2020-01-17 06:42:53 |
| 114.234.104.16 | attackspam | Unauthorized connection attempt detected from IP address 114.234.104.16 to port 85 [J] |
2020-01-17 06:37:22 |
| 101.109.140.241 | attackbotsspam | Unauthorized connection attempt detected from IP address 101.109.140.241 to port 81 [J] |
2020-01-17 06:41:57 |
| 106.75.64.59 | attackspam | Unauthorized connection attempt detected from IP address 106.75.64.59 to port 1521 [J] |
2020-01-17 06:40:37 |
| 129.213.42.20 | attackbots | Jan 16 23:01:46 vpn01 sshd[27104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.42.20 Jan 16 23:01:47 vpn01 sshd[27104]: Failed password for invalid user dye from 129.213.42.20 port 44614 ssh2 ... |
2020-01-17 06:21:28 |