城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.207.66.24 | attack | 1586798208 - 04/13/2020 19:16:48 Host: 14.207.66.24/14.207.66.24 Port: 445 TCP Blocked |
2020-04-14 04:49:28 |
| 14.207.66.220 | attack | Lines containing failures of 14.207.66.220 Nov 11 23:25:19 shared12 sshd[31743]: Invalid user admin from 14.207.66.220 port 43397 Nov 11 23:25:19 shared12 sshd[31743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.66.220 Nov 11 23:25:21 shared12 sshd[31743]: Failed password for invalid user admin from 14.207.66.220 port 43397 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.207.66.220 |
2019-11-12 07:28:34 |
| 14.207.66.162 | attackbots | Chat Spam |
2019-10-18 16:39:38 |
| 14.207.66.19 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-09-01 19:20:06 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.66.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.66.154. IN A
;; AUTHORITY SECTION:
. 54 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:40:37 CST 2022
;; MSG SIZE rcvd: 106
154.66.207.14.in-addr.arpa domain name pointer mx-ll-14.207.66-154.dynamic.3bb.in.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
154.66.207.14.in-addr.arpa name = mx-ll-14.207.66-154.dynamic.3bb.in.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 27.68.49.15 | attackspambots | 1596024516 - 07/29/2020 14:08:36 Host: 27.68.49.15/27.68.49.15 Port: 445 TCP Blocked |
2020-07-30 01:51:20 |
| 88.84.223.162 | attack | Invalid user uucp from 88.84.223.162 port 23515 |
2020-07-30 01:42:28 |
| 91.134.135.95 | attackspam | 2020-07-28 13:46:17 server sshd[19321]: Failed password for invalid user ncs from 91.134.135.95 port 55666 ssh2 |
2020-07-30 02:02:01 |
| 200.52.80.34 | attack | 2020-07-29T19:03:36.373264sd-86998 sshd[44425]: Invalid user liukaili from 200.52.80.34 port 47728 2020-07-29T19:03:36.376582sd-86998 sshd[44425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34 2020-07-29T19:03:36.373264sd-86998 sshd[44425]: Invalid user liukaili from 200.52.80.34 port 47728 2020-07-29T19:03:38.225432sd-86998 sshd[44425]: Failed password for invalid user liukaili from 200.52.80.34 port 47728 ssh2 2020-07-29T19:06:38.660598sd-86998 sshd[44823]: Invalid user yeqian from 200.52.80.34 port 55470 ... |
2020-07-30 01:54:37 |
| 172.67.73.189 | attack | From: "Amazon.com" |
2020-07-30 01:47:45 |
| 185.53.88.113 | attackbots | [portscan] Port scan |
2020-07-30 01:38:37 |
| 49.234.56.65 | attack | SSH Brute Force |
2020-07-30 02:06:35 |
| 87.98.156.62 | attackspam | SSH brute-force attempt |
2020-07-30 02:02:18 |
| 103.93.16.105 | attackspam | 2020-07-29T14:02:50.369934ns386461 sshd\[4322\]: Invalid user ykc from 103.93.16.105 port 39408 2020-07-29T14:02:50.374464ns386461 sshd\[4322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 2020-07-29T14:02:53.154554ns386461 sshd\[4322\]: Failed password for invalid user ykc from 103.93.16.105 port 39408 ssh2 2020-07-29T14:08:24.745799ns386461 sshd\[9223\]: Invalid user xingfeng from 103.93.16.105 port 37922 2020-07-29T14:08:24.750361ns386461 sshd\[9223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 ... |
2020-07-30 02:00:32 |
| 218.92.0.251 | attack | Jul 30 04:06:45 localhost sshd[3700900]: Unable to negotiate with 218.92.0.251 port 60830: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-07-30 02:12:34 |
| 89.22.180.208 | attackbotsspam | Jul 29 19:11:23 ns392434 sshd[23063]: Invalid user yongqin from 89.22.180.208 port 46508 Jul 29 19:11:23 ns392434 sshd[23063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.180.208 Jul 29 19:11:23 ns392434 sshd[23063]: Invalid user yongqin from 89.22.180.208 port 46508 Jul 29 19:11:25 ns392434 sshd[23063]: Failed password for invalid user yongqin from 89.22.180.208 port 46508 ssh2 Jul 29 19:21:59 ns392434 sshd[23263]: Invalid user janfaust from 89.22.180.208 port 48040 Jul 29 19:21:59 ns392434 sshd[23263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.180.208 Jul 29 19:21:59 ns392434 sshd[23263]: Invalid user janfaust from 89.22.180.208 port 48040 Jul 29 19:22:01 ns392434 sshd[23263]: Failed password for invalid user janfaust from 89.22.180.208 port 48040 ssh2 Jul 29 19:26:02 ns392434 sshd[23293]: Invalid user nisuser2 from 89.22.180.208 port 59058 |
2020-07-30 02:09:49 |
| 178.32.218.192 | attack | 2020-07-29T13:22:03.646030shield sshd\[13719\]: Invalid user mpcheng from 178.32.218.192 port 47169 2020-07-29T13:22:03.651844shield sshd\[13719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3303787.ovh.net 2020-07-29T13:22:04.940777shield sshd\[13719\]: Failed password for invalid user mpcheng from 178.32.218.192 port 47169 ssh2 2020-07-29T13:25:48.118053shield sshd\[14394\]: Invalid user rjh from 178.32.218.192 port 52443 2020-07-29T13:25:48.124983shield sshd\[14394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3303787.ovh.net |
2020-07-30 01:56:45 |
| 93.47.149.16 | attackspambots | Automatic report - Banned IP Access |
2020-07-30 01:58:07 |
| 61.177.172.142 | attack | Jul 29 19:31:40 santamaria sshd\[7971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.142 user=root Jul 29 19:31:42 santamaria sshd\[7971\]: Failed password for root from 61.177.172.142 port 44502 ssh2 Jul 29 19:32:05 santamaria sshd\[7973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.142 user=root ... |
2020-07-30 01:40:50 |
| 196.43.231.123 | attackspambots | 2020-07-29T17:19:39.028535shield sshd\[7200\]: Invalid user huwenp from 196.43.231.123 port 53747 2020-07-29T17:19:39.041123shield sshd\[7200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.231.123 2020-07-29T17:19:41.091625shield sshd\[7200\]: Failed password for invalid user huwenp from 196.43.231.123 port 53747 ssh2 2020-07-29T17:22:31.508989shield sshd\[7470\]: Invalid user qt from 196.43.231.123 port 43109 2020-07-29T17:22:31.520142shield sshd\[7470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.231.123 |
2020-07-30 01:38:15 |