城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.165.139.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.165.139.47. IN A
;; AUTHORITY SECTION:
. 347 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:08:55 CST 2022
;; MSG SIZE rcvd: 106
47.139.165.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
47.139.165.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 87.251.74.44 | attackspam | Jun 20 22:16:14 debian-2gb-nbg1-2 kernel: \[14942856.988696\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.44 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=63352 PROTO=TCP SPT=52882 DPT=830 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-21 04:23:09 |
| 122.51.210.176 | attackspam | Jun 20 23:41:25 journals sshd\[63065\]: Invalid user lbs from 122.51.210.176 Jun 20 23:41:25 journals sshd\[63065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.210.176 Jun 20 23:41:27 journals sshd\[63065\]: Failed password for invalid user lbs from 122.51.210.176 port 59994 ssh2 Jun 20 23:44:15 journals sshd\[63406\]: Invalid user userftp from 122.51.210.176 Jun 20 23:44:15 journals sshd\[63406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.210.176 ... |
2020-06-21 04:52:23 |
| 222.186.175.202 | attack | Jun 20 16:16:06 NPSTNNYC01T sshd[6306]: Failed password for root from 222.186.175.202 port 31294 ssh2 Jun 20 16:16:09 NPSTNNYC01T sshd[6306]: Failed password for root from 222.186.175.202 port 31294 ssh2 Jun 20 16:16:12 NPSTNNYC01T sshd[6306]: Failed password for root from 222.186.175.202 port 31294 ssh2 Jun 20 16:16:16 NPSTNNYC01T sshd[6306]: Failed password for root from 222.186.175.202 port 31294 ssh2 ... |
2020-06-21 04:21:00 |
| 222.186.190.17 | attack | 2020-06-20T15:35:52.030280homeassistant sshd[27017]: Failed password for root from 222.186.190.17 port 19317 ssh2 2020-06-20T20:36:00.816047homeassistant sshd[630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root ... |
2020-06-21 04:39:49 |
| 148.71.44.11 | attack | Jun 20 23:09:37 ift sshd\[50056\]: Invalid user select from 148.71.44.11Jun 20 23:09:39 ift sshd\[50056\]: Failed password for invalid user select from 148.71.44.11 port 48309 ssh2Jun 20 23:12:49 ift sshd\[50658\]: Failed password for root from 148.71.44.11 port 48322 ssh2Jun 20 23:15:49 ift sshd\[51111\]: Invalid user hiperg from 148.71.44.11Jun 20 23:15:51 ift sshd\[51111\]: Failed password for invalid user hiperg from 148.71.44.11 port 48336 ssh2 ... |
2020-06-21 04:47:31 |
| 61.177.172.61 | attackspambots | 2020-06-20T22:27:57.691297sd-86998 sshd[8067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61 user=root 2020-06-20T22:27:59.369998sd-86998 sshd[8067]: Failed password for root from 61.177.172.61 port 56517 ssh2 2020-06-20T22:28:02.762122sd-86998 sshd[8067]: Failed password for root from 61.177.172.61 port 56517 ssh2 2020-06-20T22:27:57.691297sd-86998 sshd[8067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61 user=root 2020-06-20T22:27:59.369998sd-86998 sshd[8067]: Failed password for root from 61.177.172.61 port 56517 ssh2 2020-06-20T22:28:02.762122sd-86998 sshd[8067]: Failed password for root from 61.177.172.61 port 56517 ssh2 2020-06-20T22:27:57.691297sd-86998 sshd[8067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61 user=root 2020-06-20T22:27:59.369998sd-86998 sshd[8067]: Failed password for root from 61.177.172.61 p ... |
2020-06-21 04:30:39 |
| 203.99.60.214 | attackbotsspam | 2020-06-20T22:28:53.189746galaxy.wi.uni-potsdam.de sshd[6622]: Failed password for root from 203.99.60.214 port 34530 ssh2 2020-06-20T22:30:15.245215galaxy.wi.uni-potsdam.de sshd[6786]: Invalid user lliam from 203.99.60.214 port 52236 2020-06-20T22:30:15.247575galaxy.wi.uni-potsdam.de sshd[6786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mbl-99-60-214.dsl.net.pk 2020-06-20T22:30:15.245215galaxy.wi.uni-potsdam.de sshd[6786]: Invalid user lliam from 203.99.60.214 port 52236 2020-06-20T22:30:17.202360galaxy.wi.uni-potsdam.de sshd[6786]: Failed password for invalid user lliam from 203.99.60.214 port 52236 ssh2 2020-06-20T22:31:36.429567galaxy.wi.uni-potsdam.de sshd[6958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mbl-99-60-214.dsl.net.pk user=root 2020-06-20T22:31:38.174096galaxy.wi.uni-potsdam.de sshd[6958]: Failed password for root from 203.99.60.214 port 41710 ssh2 2020-06-20T22:32:53.627932gala ... |
2020-06-21 04:49:21 |
| 222.186.30.112 | attackbots | Jun 21 06:35:27 localhost sshd[3523355]: Disconnected from 222.186.30.112 port 41873 [preauth] ... |
2020-06-21 04:37:00 |
| 119.202.208.51 | attackbots | $f2bV_matches |
2020-06-21 04:34:16 |
| 89.248.168.157 | attackbots | " " |
2020-06-21 04:39:17 |
| 95.49.86.166 | attackspam | Automatic report - Port Scan Attack |
2020-06-21 04:34:01 |
| 45.95.168.176 | attackspam | Jun 20 22:34:13 webctf sshd[10297]: User root from 45.95.168.176 not allowed because not listed in AllowUsers Jun 20 22:34:21 webctf sshd[10301]: User root from 45.95.168.176 not allowed because not listed in AllowUsers Jun 20 22:34:28 webctf sshd[10328]: User root from 45.95.168.176 not allowed because not listed in AllowUsers Jun 20 22:34:35 webctf sshd[10407]: Invalid user admin from 45.95.168.176 port 50438 Jun 20 22:34:42 webctf sshd[10410]: Invalid user admin from 45.95.168.176 port 33560 Jun 20 22:34:52 webctf sshd[10412]: User ubuntu from 45.95.168.176 not allowed because not listed in AllowUsers Jun 20 22:34:56 webctf sshd[10414]: User root from 45.95.168.176 not allowed because not listed in AllowUsers Jun 20 22:35:05 webctf sshd[10481]: Invalid user user from 45.95.168.176 port 39226 Jun 20 22:35:12 webctf sshd[10483]: Invalid user ubnt from 45.95.168.176 port 50554 Jun 20 22:35:20 webctf sshd[10561]: Invalid user support from 45.95.168.176 port 33700 ... |
2020-06-21 04:44:25 |
| 134.209.149.64 | attackbotsspam | 2020-06-20T15:48:47.4857671495-001 sshd[40709]: Failed password for invalid user git from 134.209.149.64 port 48346 ssh2 2020-06-20T15:52:44.8302181495-001 sshd[40824]: Invalid user oracle from 134.209.149.64 port 47524 2020-06-20T15:52:44.8335681495-001 sshd[40824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.149.64 2020-06-20T15:52:44.8302181495-001 sshd[40824]: Invalid user oracle from 134.209.149.64 port 47524 2020-06-20T15:52:47.0997491495-001 sshd[40824]: Failed password for invalid user oracle from 134.209.149.64 port 47524 ssh2 2020-06-20T15:56:36.7838651495-001 sshd[40924]: Invalid user ly from 134.209.149.64 port 46696 ... |
2020-06-21 04:46:00 |
| 94.56.213.42 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-06-21 04:56:23 |
| 178.32.221.142 | attackspambots | Jun 20 22:26:42 piServer sshd[15028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.221.142 Jun 20 22:26:43 piServer sshd[15028]: Failed password for invalid user kai from 178.32.221.142 port 33148 ssh2 Jun 20 22:32:09 piServer sshd[15408]: Failed password for root from 178.32.221.142 port 33945 ssh2 ... |
2020-06-21 04:40:14 |