城市(city): Ho Chi Minh City
省份(region): Ho Chi Minh
国家(country): Vietnam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.187.42.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.187.42.16. IN A
;; AUTHORITY SECTION:
. 331 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023100300 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 04 00:26:37 CST 2023
;; MSG SIZE rcvd: 105
16.42.187.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
16.42.187.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 203.186.57.191 | attack | Sep 19 22:29:25 ny01 sshd[4438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.186.57.191 Sep 19 22:29:27 ny01 sshd[4438]: Failed password for invalid user user from 203.186.57.191 port 46028 ssh2 Sep 19 22:33:51 ny01 sshd[5280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.186.57.191 |
2019-09-20 10:39:50 |
| 85.21.63.173 | attack | Sep 19 17:10:17 eddieflores sshd\[12904\]: Invalid user ren from 85.21.63.173 Sep 19 17:10:17 eddieflores sshd\[12904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.21.63.173 Sep 19 17:10:19 eddieflores sshd\[12904\]: Failed password for invalid user ren from 85.21.63.173 port 50076 ssh2 Sep 19 17:15:02 eddieflores sshd\[13244\]: Invalid user vinay from 85.21.63.173 Sep 19 17:15:02 eddieflores sshd\[13244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.21.63.173 |
2019-09-20 11:17:44 |
| 5.39.93.158 | attackspam | Sep 20 04:08:01 ArkNodeAT sshd\[759\]: Invalid user hi from 5.39.93.158 Sep 20 04:08:01 ArkNodeAT sshd\[759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.93.158 Sep 20 04:08:03 ArkNodeAT sshd\[759\]: Failed password for invalid user hi from 5.39.93.158 port 40310 ssh2 |
2019-09-20 10:58:04 |
| 51.83.72.108 | attackspambots | Sep 20 04:37:28 SilenceServices sshd[22926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.108 Sep 20 04:37:30 SilenceServices sshd[22926]: Failed password for invalid user user4 from 51.83.72.108 port 58362 ssh2 Sep 20 04:41:21 SilenceServices sshd[25849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.108 |
2019-09-20 10:43:17 |
| 46.105.244.17 | attackspambots | Sep 20 04:43:55 SilenceServices sshd[27729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.244.17 Sep 20 04:43:57 SilenceServices sshd[27729]: Failed password for invalid user temp from 46.105.244.17 port 35884 ssh2 Sep 20 04:47:52 SilenceServices sshd[30620]: Failed password for root from 46.105.244.17 port 49328 ssh2 |
2019-09-20 10:48:08 |
| 196.15.168.146 | attack | Brute force attempt |
2019-09-20 10:38:57 |
| 210.209.72.243 | attack | Sep 19 16:51:59 php1 sshd\[3854\]: Invalid user md from 210.209.72.243 Sep 19 16:51:59 php1 sshd\[3854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.72.243 Sep 19 16:52:01 php1 sshd\[3854\]: Failed password for invalid user md from 210.209.72.243 port 54246 ssh2 Sep 19 16:55:55 php1 sshd\[4331\]: Invalid user mauro from 210.209.72.243 Sep 19 16:55:55 php1 sshd\[4331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.72.243 |
2019-09-20 11:18:52 |
| 5.196.132.11 | attackbotsspam | Sep 20 05:42:36 www5 sshd\[39766\]: Invalid user adminuser from 5.196.132.11 Sep 20 05:42:36 www5 sshd\[39766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.132.11 Sep 20 05:42:38 www5 sshd\[39766\]: Failed password for invalid user adminuser from 5.196.132.11 port 47548 ssh2 ... |
2019-09-20 11:01:07 |
| 212.156.17.218 | attack | Sep 19 18:25:39 home sshd[26382]: Invalid user cactiuser from 212.156.17.218 port 58662 Sep 19 18:25:39 home sshd[26382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.17.218 Sep 19 18:25:39 home sshd[26382]: Invalid user cactiuser from 212.156.17.218 port 58662 Sep 19 18:25:42 home sshd[26382]: Failed password for invalid user cactiuser from 212.156.17.218 port 58662 ssh2 Sep 19 18:54:23 home sshd[26449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.17.218 user=root Sep 19 18:54:25 home sshd[26449]: Failed password for root from 212.156.17.218 port 42090 ssh2 Sep 19 18:58:21 home sshd[26465]: Invalid user akanistha from 212.156.17.218 port 58598 Sep 19 18:58:21 home sshd[26465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.17.218 Sep 19 18:58:21 home sshd[26465]: Invalid user akanistha from 212.156.17.218 port 58598 Sep 19 18:58:24 home sshd[26465]: Failed p |
2019-09-20 10:45:07 |
| 104.248.227.130 | attack | Sep 20 06:06:12 www sshd\[32683\]: Invalid user cacti from 104.248.227.130 Sep 20 06:06:12 www sshd\[32683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.227.130 Sep 20 06:06:13 www sshd\[32683\]: Failed password for invalid user cacti from 104.248.227.130 port 44896 ssh2 ... |
2019-09-20 11:07:16 |
| 1.143.168.182 | attackspambots | Automatic report - Port Scan Attack |
2019-09-20 11:16:45 |
| 151.70.56.177 | attackbots | Automatic report - Port Scan Attack |
2019-09-20 11:08:49 |
| 149.129.227.171 | attack | Sep 20 03:41:28 dev0-dcfr-rnet sshd[4053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.227.171 Sep 20 03:41:30 dev0-dcfr-rnet sshd[4053]: Failed password for invalid user agnes from 149.129.227.171 port 44532 ssh2 Sep 20 03:53:30 dev0-dcfr-rnet sshd[4089]: Failed password for root from 149.129.227.171 port 55292 ssh2 |
2019-09-20 10:50:03 |
| 115.59.21.226 | attackbotsspam | Unauthorised access (Sep 20) SRC=115.59.21.226 LEN=40 TTL=50 ID=5186 TCP DPT=8080 WINDOW=4079 SYN Unauthorised access (Sep 18) SRC=115.59.21.226 LEN=40 TTL=50 ID=19482 TCP DPT=8080 WINDOW=4079 SYN |
2019-09-20 10:50:30 |
| 24.232.29.188 | attackspambots | Sep 20 09:11:53 webhost01 sshd[15767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.232.29.188 Sep 20 09:11:55 webhost01 sshd[15767]: Failed password for invalid user temp from 24.232.29.188 port 58841 ssh2 ... |
2019-09-20 10:43:36 |