城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.187.149.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32213
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.187.149.245. IN A
;; AUTHORITY SECTION:
. 387 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:13:59 CST 2022
;; MSG SIZE rcvd: 107
245.149.187.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.149.187.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.232.93.69 | attack | Brute Force |
2020-08-28 13:33:23 |
| 200.7.217.185 | attackbotsspam | 2020-08-28T03:56:54.737508ionos.janbro.de sshd[81739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.217.185 2020-08-28T03:56:54.347827ionos.janbro.de sshd[81739]: Invalid user view from 200.7.217.185 port 36266 2020-08-28T03:56:56.735327ionos.janbro.de sshd[81739]: Failed password for invalid user view from 200.7.217.185 port 36266 ssh2 2020-08-28T04:00:55.914100ionos.janbro.de sshd[81761]: Invalid user felix from 200.7.217.185 port 43494 2020-08-28T04:00:56.486266ionos.janbro.de sshd[81761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.217.185 2020-08-28T04:00:55.914100ionos.janbro.de sshd[81761]: Invalid user felix from 200.7.217.185 port 43494 2020-08-28T04:00:59.002825ionos.janbro.de sshd[81761]: Failed password for invalid user felix from 200.7.217.185 port 43494 ssh2 2020-08-28T04:04:53.821610ionos.janbro.de sshd[81804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... |
2020-08-28 13:54:14 |
| 112.16.211.200 | attackspambots | Aug 28 12:10:35 webhost01 sshd[28399]: Failed password for root from 112.16.211.200 port 6122 ssh2 Aug 28 12:12:27 webhost01 sshd[28409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.16.211.200 ... |
2020-08-28 13:37:18 |
| 171.251.0.51 | attack | Unauthorised access (Aug 28) SRC=171.251.0.51 LEN=52 TTL=48 ID=29495 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-28 13:29:33 |
| 96.50.224.169 | attack | Aug 28 07:19:18 *host* sshd\[2960\]: Invalid user pi from 96.50.224.169 port 50780 |
2020-08-28 13:32:25 |
| 190.145.192.106 | attackbots | Aug 28 06:51:13 kh-dev-server sshd[11582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106 ... |
2020-08-28 13:57:24 |
| 101.71.51.192 | attack | Aug 28 07:02:07 vps639187 sshd\[28815\]: Invalid user nwu from 101.71.51.192 port 40394 Aug 28 07:02:07 vps639187 sshd\[28815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192 Aug 28 07:02:10 vps639187 sshd\[28815\]: Failed password for invalid user nwu from 101.71.51.192 port 40394 ssh2 ... |
2020-08-28 13:19:10 |
| 106.54.242.239 | attackbots | Aug 28 05:42:55 ns382633 sshd\[24486\]: Invalid user vbox from 106.54.242.239 port 54074 Aug 28 05:42:55 ns382633 sshd\[24486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.242.239 Aug 28 05:42:56 ns382633 sshd\[24486\]: Failed password for invalid user vbox from 106.54.242.239 port 54074 ssh2 Aug 28 05:54:53 ns382633 sshd\[26398\]: Invalid user jung from 106.54.242.239 port 58162 Aug 28 05:54:53 ns382633 sshd\[26398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.242.239 |
2020-08-28 13:32:00 |
| 185.90.85.86 | attackspam | *Port Scan* detected from 185.90.85.86 (HU/Hungary/Zala/Nagykanizsa/-). 4 hits in the last 205 seconds |
2020-08-28 13:22:28 |
| 210.195.154.146 | attackspam | Unauthorised access (Aug 28) SRC=210.195.154.146 LEN=44 TTL=55 ID=48623 TCP DPT=8080 WINDOW=8403 SYN Unauthorised access (Aug 28) SRC=210.195.154.146 LEN=44 TTL=55 ID=39872 TCP DPT=8080 WINDOW=30936 SYN |
2020-08-28 13:39:39 |
| 171.244.51.114 | attackspam | Invalid user uftp from 171.244.51.114 port 45194 |
2020-08-28 13:24:56 |
| 118.126.93.16 | attack | Invalid user ssy from 118.126.93.16 port 51264 |
2020-08-28 13:33:51 |
| 218.92.0.184 | attackspam | Brute-force attempt banned |
2020-08-28 13:19:50 |
| 103.84.71.238 | attack | Invalid user signature from 103.84.71.238 port 43312 |
2020-08-28 13:29:03 |
| 166.175.189.255 | attack | Brute forcing email accounts |
2020-08-28 13:35:35 |