城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
14.169.255.42 | attack | Jul 4 23:30:34 offspring postfix/smtpd[11628]: warning: hostname static.vnpt.vn does not resolve to address 14.169.255.42 Jul 4 23:30:34 offspring postfix/smtpd[11628]: connect from unknown[14.169.255.42] Jul 4 23:30:37 offspring postfix/smtpd[11628]: warning: unknown[14.169.255.42]: SASL PLAIN authentication failed: authentication failure Jul 4 23:30:38 offspring postfix/smtpd[11628]: warning: unknown[14.169.255.42]: SASL LOGIN authentication failed: authentication failure Jul 4 23:30:38 offspring postfix/smtpd[11628]: warning: unknown[14.169.255.42]: SASL CRAM-MD5 authentication failed: authentication failure Jul 4 23:30:39 offspring postfix/smtpd[11628]: disconnect from unknown[14.169.255.42] Jul 4 23:30:39 offspring postfix/smtpd[11628]: warning: hostname static.vnpt.vn does not resolve to address 14.169.255.42 Jul 4 23:30:39 offspring postfix/smtpd[11628]: connect from unknown[14.169.255.42] Jul 4 23:30:42 offspring postfix/smtpd[11628]: warning: unknown[1........ ------------------------------- |
2020-07-05 07:19:00 |
14.169.255.216 | attackbots | smtp probe/invalid login attempt |
2020-01-02 13:21:23 |
14.169.255.16 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/14.169.255.16/ VN - 1H : (45) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : VN NAME ASN : ASN45899 IP : 14.169.255.16 CIDR : 14.169.224.0/19 PREFIX COUNT : 2411 UNIQUE IP COUNT : 7209216 ATTACKS DETECTED ASN45899 : 1H - 9 3H - 10 6H - 12 12H - 16 24H - 24 DateTime : 2019-11-12 23:36:42 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-13 06:51:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.169.255.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.169.255.34. IN A
;; AUTHORITY SECTION:
. 143 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:10:17 CST 2022
;; MSG SIZE rcvd: 106
34.255.169.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.255.169.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
106.13.118.102 | attackspambots | May 15 18:14:22 ip-172-31-62-245 sshd\[24435\]: Invalid user echo from 106.13.118.102\ May 15 18:14:24 ip-172-31-62-245 sshd\[24435\]: Failed password for invalid user echo from 106.13.118.102 port 44158 ssh2\ May 15 18:18:32 ip-172-31-62-245 sshd\[24470\]: Invalid user writing from 106.13.118.102\ May 15 18:18:33 ip-172-31-62-245 sshd\[24470\]: Failed password for invalid user writing from 106.13.118.102 port 60676 ssh2\ May 15 18:22:20 ip-172-31-62-245 sshd\[24500\]: Invalid user canada from 106.13.118.102\ |
2020-05-16 04:31:02 |
187.133.229.89 | attack | Unauthorised access (May 15) SRC=187.133.229.89 LEN=52 TTL=111 ID=11423 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-16 04:13:55 |
83.97.20.33 | attack | port scan and connect, tcp 1025 (NFS-or-IIS) |
2020-05-16 04:42:50 |
112.85.42.174 | attack | May 15 22:38:32 server sshd[15315]: Failed none for root from 112.85.42.174 port 39828 ssh2 May 15 22:38:34 server sshd[15315]: Failed password for root from 112.85.42.174 port 39828 ssh2 May 15 22:38:39 server sshd[15315]: Failed password for root from 112.85.42.174 port 39828 ssh2 |
2020-05-16 04:43:13 |
68.183.238.182 | attackspambots | Lines containing failures of 68.183.238.182 May 14 15:32:35 kmh-vmh-002-fsn07 sshd[8010]: Invalid user nagios from 68.183.238.182 port 46828 May 14 15:32:35 kmh-vmh-002-fsn07 sshd[8010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 May 14 15:32:38 kmh-vmh-002-fsn07 sshd[8010]: Failed password for invalid user nagios from 68.183.238.182 port 46828 ssh2 May 14 15:32:40 kmh-vmh-002-fsn07 sshd[8010]: Received disconnect from 68.183.238.182 port 46828:11: Bye Bye [preauth] May 14 15:32:40 kmh-vmh-002-fsn07 sshd[8010]: Disconnected from invalid user nagios 68.183.238.182 port 46828 [preauth] May 14 15:47:50 kmh-vmh-002-fsn07 sshd[32300]: Invalid user neetha from 68.183.238.182 port 51972 May 14 15:47:50 kmh-vmh-002-fsn07 sshd[32300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.238.182 May 14 15:47:52 kmh-vmh-002-fsn07 sshd[32300]: Failed password for invalid user neet........ ------------------------------ |
2020-05-16 04:14:52 |
83.229.149.191 | attackbotsspam | Invalid user backup from 83.229.149.191 port 34080 |
2020-05-16 04:24:44 |
159.65.155.58 | attackspambots | firewall-block, port(s): 10161/udp |
2020-05-16 04:20:55 |
68.70.49.253 | attackspambots | Hits on port : 8080 |
2020-05-16 04:29:54 |
36.230.232.182 | attackbots | (sshd) Failed SSH login from 36.230.232.182 (TW/Taiwan/36-230-232-182.dynamic-ip.hinet.net): 5 in the last 3600 secs |
2020-05-16 04:42:19 |
106.79.202.47 | attackbots | SSH bruteforce |
2020-05-16 04:21:19 |
174.209.7.86 | attackspambots | Brute forcing email accounts |
2020-05-16 04:33:03 |
111.229.226.212 | attackbotsspam | "Unauthorized connection attempt on SSHD detected" |
2020-05-16 04:19:54 |
190.153.47.250 | attack | 1589545131 - 05/15/2020 14:18:51 Host: 190.153.47.250/190.153.47.250 Port: 445 TCP Blocked |
2020-05-16 04:38:38 |
129.28.148.242 | attackbotsspam | May 15 21:29:14 server sshd[15079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.148.242 May 15 21:29:16 server sshd[15079]: Failed password for invalid user postgres from 129.28.148.242 port 54622 ssh2 May 15 21:31:23 server sshd[15304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.148.242 ... |
2020-05-16 04:35:40 |
103.225.50.81 | attack | Repeated attempts against wp-login |
2020-05-16 04:24:15 |