城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): Vietnam Posts and Telecommunications Group
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.166.85.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.166.85.159. IN A
;; AUTHORITY SECTION:
. 582 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050900 1800 900 604800 86400
;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 09 16:03:13 CST 2020
;; MSG SIZE rcvd: 117
159.85.166.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
159.85.166.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
162.243.174.84 | attackbotsspam | Lines containing failures of 162.243.174.84 Jul 5 10:26:22 server01 postfix/smtpd[2340]: connect from inspirehealthiness.com[162.243.174.84] Jul x@x Jul x@x Jul 5 10:26:24 server01 postfix/policy-spf[2348]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=altel%40rfai.com;ip=162.243.174.84;r=server01.2800km.de Jul x@x Jul 5 10:26:24 server01 postfix/smtpd[2340]: lost connection after RCPT from inspirehealthiness.com[162.243.174.84] Jul 5 10:26:24 server01 postfix/smtpd[2340]: disconnect from inspirehealthiness.com[162.243.174.84] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=162.243.174.84 |
2019-07-08 08:35:45 |
78.128.113.67 | attackspambots | Jul 8 01:55:23 mail postfix/smtpd\[24354\]: warning: unknown\[78.128.113.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 01:55:31 mail postfix/smtpd\[24354\]: warning: unknown\[78.128.113.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 02:35:38 mail postfix/smtpd\[27537\]: warning: unknown\[78.128.113.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-07-08 08:39:00 |
191.243.199.42 | attackspam | Jul 3 04:22:52 ghostname-secure sshd[2574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.243.199.42 user=r.r Jul 3 04:22:54 ghostname-secure sshd[2574]: Failed password for r.r from 191.243.199.42 port 55598 ssh2 Jul 3 04:22:57 ghostname-secure sshd[2574]: Failed password for r.r from 191.243.199.42 port 55598 ssh2 Jul 3 04:23:01 ghostname-secure sshd[2574]: Failed password for r.r from 191.243.199.42 port 55598 ssh2 Jul 3 04:23:04 ghostname-secure sshd[2574]: Failed password for r.r from 191.243.199.42 port 55598 ssh2 Jul 3 04:23:07 ghostname-secure sshd[2574]: Failed password for r.r from 191.243.199.42 port 55598 ssh2 Jul 3 04:23:11 ghostname-secure sshd[2574]: Failed password for r.r from 191.243.199.42 port 55598 ssh2 Jul 3 04:23:11 ghostname-secure sshd[2574]: Disconnecting: Too many authentication failures for r.r from 191.243.199.42 port 55598 ssh2 [preauth] Jul 3 04:23:11 ghostname-secure sshd[2574]: PAM ........ ------------------------------- |
2019-07-08 08:38:03 |
142.44.152.30 | attackbots | Lines containing failures of 142.44.152.30 Jul 2 11:20:43 srv02 sshd[366]: Invalid user admin from 142.44.152.30 port 51972 Jul 2 11:20:43 srv02 sshd[366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.152.30 Jul 2 11:20:45 srv02 sshd[366]: Failed password for invalid user admin from 142.44.152.30 port 51972 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=142.44.152.30 |
2019-07-08 08:12:03 |
212.232.70.94 | attackbots | TCP src-port=34288 dst-port=25 abuseat-org barracuda zen-spamhaus (Project Honey Pot rated Suspicious) (3) |
2019-07-08 08:51:04 |
51.15.1.221 | attackbots | Jul 1 09:28:10 www sshd[22802]: Failed password for r.r from 51.15.1.221 port 45066 ssh2 Jul 1 09:28:12 www sshd[22802]: Failed password for r.r from 51.15.1.221 port 45066 ssh2 Jul 1 09:28:14 www sshd[22802]: Failed password for r.r from 51.15.1.221 port 45066 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=51.15.1.221 |
2019-07-08 08:50:41 |
58.233.121.253 | attackbotsspam | Jul 4 13:40:21 mxgate1 postfix/postscreen[8023]: CONNECT from [58.233.121.253]:58628 to [176.31.12.44]:25 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8026]: addr 58.233.121.253 listed by domain zen.spamhaus.org as 127.0.0.11 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8026]: addr 58.233.121.253 listed by domain zen.spamhaus.org as 127.0.0.4 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8026]: addr 58.233.121.253 listed by domain zen.spamhaus.org as 127.0.0.3 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8024]: addr 58.233.121.253 listed by domain cbl.abuseat.org as 127.0.0.2 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8027]: addr 58.233.121.253 listed by domain bl.spamcop.net as 127.0.0.2 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8028]: addr 58.233.121.253 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jul 4 13:40:21 mxgate1 postfix/dnsblog[8025]: addr 58.233.121.253 listed by domain b.barracudacentral.org as 127.0.0.2 Jul 4 13:40:27 mxgate1 postfix/postscreen[8023]: DNSBL rank 6 for [58.2........ ------------------------------- |
2019-07-08 08:24:10 |
82.135.30.41 | attackbots | Many RDP login attempts detected by IDS script |
2019-07-08 08:09:30 |
181.228.171.119 | attack | 2019-07-03 18:28:15 H=(119-171-228-181.cab.prima.com.ar) [181.228.171.119]:26633 I=[10.100.18.21]:25 F= |
2019-07-08 08:46:30 |
41.71.102.26 | attackspambots | Unauthorised access (Jul 8) SRC=41.71.102.26 LEN=52 TTL=117 ID=9765 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-08 08:10:18 |
103.99.3.89 | attack | Jul 8 06:11:04 lcl-usvr-01 sshd[19340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.3.89 user=root Jul 8 06:11:07 lcl-usvr-01 sshd[19377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.3.89 Jul 8 06:11:10 lcl-usvr-01 sshd[19397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.3.89 |
2019-07-08 08:31:10 |
34.83.153.11 | attackbots | (From hayden.laroche@hotmail.com) Hello YOU WANT LIVE BUT EXPIRED DOMAINS That Are Still Posted On Wikipedia And Youtube ? Can you imagine how powerful it is to be able to pick up an expired domain that is still posted below a YouTube video that is getting hundreds or even thousands of views per day? Or be able to pick up an expired domain that still has a live link from Wikipedia? MyTrafficJacker allows users to search by keyword on either Wikipedia and YouTube and find live but expired links that are still posted on these sites that you can pick up for as little as $10 and redirect that traffic and authority anywhere they’d like. NOW GET TRAFFIC and SALES in as little as 24 hours: without having to make or rank any videos, without having to create a website, without having to pay a dime for traffic... IF YOU ARE INTERESTED, CONTACT US ==> sayedasaliha748@gmail.com Once you Join TODAY, You'll Also GET AMAZING BONUSES Regards, TrafficJacker |
2019-07-08 08:41:11 |
147.135.195.254 | attackbotsspam | SSH Brute Force, server-1 sshd[2143]: Failed password for invalid user testuser from 147.135.195.254 port 58054 ssh2 |
2019-07-08 08:08:35 |
106.13.72.28 | attack | web-1 [ssh] SSH Attack |
2019-07-08 08:29:52 |
222.239.10.134 | attackspambots | Unauthorised access (Jul 8) SRC=222.239.10.134 LEN=40 TTL=244 ID=30696 TCP DPT=445 WINDOW=1024 SYN |
2019-07-08 08:37:17 |