城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.171.164.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.171.164.113. IN A
;; AUTHORITY SECTION:
. 388 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:48:42 CST 2022
;; MSG SIZE rcvd: 107
113.164.171.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
113.164.171.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 195.147.82.125 | attack | TCP Port Scanning |
2019-11-13 19:38:17 |
| 140.143.17.156 | attackspambots | Nov 13 13:05:29 gw1 sshd[9931]: Failed password for root from 140.143.17.156 port 46098 ssh2 Nov 13 13:10:13 gw1 sshd[10148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.17.156 ... |
2019-11-13 19:57:51 |
| 177.53.102.132 | attackspambots | Port scan |
2019-11-13 19:19:36 |
| 148.70.226.228 | attackspambots | Nov 13 14:20:31 areeb-Workstation sshd[28115]: Failed password for root from 148.70.226.228 port 59094 ssh2 Nov 13 14:25:15 areeb-Workstation sshd[28988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.226.228 ... |
2019-11-13 19:23:23 |
| 123.10.149.242 | attackbotsspam | Port scan |
2019-11-13 19:35:08 |
| 178.33.12.237 | attackspambots | Nov 13 12:02:44 vps691689 sshd[25965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 Nov 13 12:02:46 vps691689 sshd[25965]: Failed password for invalid user aknet from 178.33.12.237 port 52810 ssh2 ... |
2019-11-13 19:24:48 |
| 88.90.232.252 | attack | TCP Port Scanning |
2019-11-13 19:29:05 |
| 51.68.137.26 | attack | Nov 13 12:08:40 * sshd[13534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.137.26 Nov 13 12:08:41 * sshd[13534]: Failed password for invalid user gillie from 51.68.137.26 port 48326 ssh2 |
2019-11-13 19:23:51 |
| 202.191.200.227 | attack | Nov 13 08:23:18 v22019058497090703 sshd[17984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.200.227 Nov 13 08:23:20 v22019058497090703 sshd[17984]: Failed password for invalid user ritchy from 202.191.200.227 port 60897 ssh2 Nov 13 08:27:38 v22019058497090703 sshd[18312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.200.227 ... |
2019-11-13 19:49:28 |
| 91.204.188.50 | attackspam | Nov 13 08:31:50 markkoudstaal sshd[8018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50 Nov 13 08:31:51 markkoudstaal sshd[8018]: Failed password for invalid user rago from 91.204.188.50 port 33884 ssh2 Nov 13 08:36:11 markkoudstaal sshd[8437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50 |
2019-11-13 19:31:04 |
| 210.1.31.106 | attackspambots | Nov 13 01:22:47 web1 postfix/smtpd[18897]: warning: unknown[210.1.31.106]: SASL LOGIN authentication failed: authentication failure ... |
2019-11-13 19:32:03 |
| 156.204.89.71 | attackspam | Port 1433 Scan |
2019-11-13 19:34:49 |
| 106.12.105.193 | attackbots | 2019-11-13T11:16:47.578563abusebot-3.cloudsearch.cf sshd\[32046\]: Invalid user kornfeld from 106.12.105.193 port 57504 |
2019-11-13 19:44:59 |
| 123.166.140.12 | attackspam | Port Scan: TCP/21 |
2019-11-13 20:01:41 |
| 140.143.241.251 | attack | Nov 13 08:27:36 mout sshd[29211]: Invalid user http from 140.143.241.251 port 55494 |
2019-11-13 20:00:25 |