城市(city): Ninh Bình
省份(region): Ninh Binh
国家(country): Vietnam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.175.79.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.175.79.64. IN A
;; AUTHORITY SECTION:
. 5 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023022804 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 01 10:03:45 CST 2023
;; MSG SIZE rcvd: 105
64.79.175.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
64.79.175.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 132.232.40.86 | attackspambots | Aug 2 01:14:37 server sshd[58021]: Failed password for invalid user ftpd from 132.232.40.86 port 38746 ssh2 Aug 2 01:23:07 server sshd[58752]: Failed password for invalid user xmpp from 132.232.40.86 port 36626 ssh2 Aug 2 01:28:21 server sshd[59162]: Failed password for invalid user supervisor from 132.232.40.86 port 57476 ssh2 |
2019-08-02 07:32:57 |
| 198.84.123.188 | attackspam | Aug 1 14:47:26 mxgate1 postfix/postscreen[7868]: CONNECT from [198.84.123.188]:35954 to [176.31.12.44]:25 Aug 1 14:47:26 mxgate1 postfix/dnsblog[8101]: addr 198.84.123.188 listed by domain zen.spamhaus.org as 127.0.0.3 Aug 1 14:47:26 mxgate1 postfix/postscreen[7868]: PREGREET 27 after 0.11 from [198.84.123.188]:35954: EHLO 02d6fcd4.gunlaser.co Aug 1 14:47:26 mxgate1 postfix/postscreen[7868]: DNSBL rank 2 for [198.84.123.188]:35954 Aug x@x Aug 1 14:47:26 mxgate1 postfix/postscreen[7868]: DISCONNECT [198.84.123.188]:35954 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=198.84.123.188 |
2019-08-02 07:20:11 |
| 185.227.68.78 | attackspam | Aug 2 01:28:20 ns37 sshd[26865]: Failed password for root from 185.227.68.78 port 39003 ssh2 Aug 2 01:28:20 ns37 sshd[26865]: Failed password for root from 185.227.68.78 port 39003 ssh2 Aug 2 01:28:22 ns37 sshd[26865]: Failed password for root from 185.227.68.78 port 39003 ssh2 |
2019-08-02 07:31:41 |
| 45.122.222.253 | attackspambots | Aug 2 02:22:35 yabzik sshd[3745]: Failed password for root from 45.122.222.253 port 42240 ssh2 Aug 2 02:28:02 yabzik sshd[5500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.222.253 Aug 2 02:28:05 yabzik sshd[5500]: Failed password for invalid user kafka from 45.122.222.253 port 37252 ssh2 |
2019-08-02 07:39:19 |
| 149.210.239.184 | attack | " " |
2019-08-02 07:19:24 |
| 92.118.160.61 | attackbots | firewall-block, port(s): 5351/udp |
2019-08-02 07:46:14 |
| 82.159.138.57 | attackspam | Aug 2 00:28:12 localhost sshd\[28007\]: Invalid user deploy from 82.159.138.57 port 28132 Aug 2 00:28:12 localhost sshd\[28007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.159.138.57 ... |
2019-08-02 07:35:34 |
| 106.75.93.253 | attackbotsspam | 2019-08-01T15:46:05.052932abusebot-6.cloudsearch.cf sshd\[22417\]: Invalid user support from 106.75.93.253 port 42290 |
2019-08-02 07:25:41 |
| 62.4.13.108 | attack | Aug 1 18:17:34 aat-srv002 sshd[24483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.13.108 Aug 1 18:17:36 aat-srv002 sshd[24483]: Failed password for invalid user fluffy from 62.4.13.108 port 59450 ssh2 Aug 1 18:22:10 aat-srv002 sshd[24605]: Failed password for root from 62.4.13.108 port 56828 ssh2 ... |
2019-08-02 07:40:59 |
| 106.13.4.150 | attackbotsspam | Automatic report - Banned IP Access |
2019-08-02 07:18:30 |
| 37.32.124.29 | attack | Automatic report - Banned IP Access |
2019-08-02 07:39:50 |
| 159.89.169.137 | attack | Aug 2 01:27:58 vps647732 sshd[1495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137 Aug 2 01:28:00 vps647732 sshd[1495]: Failed password for invalid user pc from 159.89.169.137 port 55958 ssh2 ... |
2019-08-02 07:41:25 |
| 103.90.64.223 | attack | 8291/tcp |
2019-08-02 07:16:33 |
| 159.65.88.161 | attackspambots | Aug 2 01:32:28 mout sshd[10393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.88.161 Aug 2 01:32:28 mout sshd[10393]: Invalid user mrdrum from 159.65.88.161 port 24441 Aug 2 01:32:29 mout sshd[10393]: Failed password for invalid user mrdrum from 159.65.88.161 port 24441 ssh2 |
2019-08-02 07:33:13 |
| 114.67.224.87 | attack | 2019-08-01T23:27:26.208914abusebot-6.cloudsearch.cf sshd\[24327\]: Invalid user factoria from 114.67.224.87 port 38000 |
2019-08-02 07:57:27 |