城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.214.121.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.214.121.43. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:03:43 CST 2025
;; MSG SIZE rcvd: 106
Host 43.121.214.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 43.121.214.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 161.117.185.222 | attackspambots | 1579795763 - 01/23/2020 23:09:23 Host: 161.117.185.222/161.117.185.222 Port: 6379 TCP Blocked ... |
2020-01-24 01:23:15 |
| 192.144.132.172 | attackbotsspam | 2020-01-24T03:08:34.613708luisaranguren sshd[854014]: Invalid user ksr from 192.144.132.172 port 53718 2020-01-24T03:08:36.373011luisaranguren sshd[854014]: Failed password for invalid user ksr from 192.144.132.172 port 53718 ssh2 ... |
2020-01-24 01:57:48 |
| 213.200.31.224 | attack | Invalid user public from 213.200.31.224 port 12986 |
2020-01-24 01:56:20 |
| 222.186.30.57 | attack | Jan 23 23:22:42 areeb-Workstation sshd[27197]: Failed password for root from 222.186.30.57 port 50630 ssh2 Jan 23 23:22:45 areeb-Workstation sshd[27197]: Failed password for root from 222.186.30.57 port 50630 ssh2 ... |
2020-01-24 01:54:09 |
| 128.199.150.228 | attackspam | Fail2Ban - SSH Bruteforce Attempt |
2020-01-24 01:41:06 |
| 180.76.98.25 | attackbotsspam | Tried sshing with brute force. |
2020-01-24 02:05:32 |
| 218.75.11.67 | attackbotsspam | 20/1/23@11:08:38: FAIL: Alarm-Network address from=218.75.11.67 20/1/23@11:08:38: FAIL: Alarm-Network address from=218.75.11.67 ... |
2020-01-24 01:57:06 |
| 193.112.173.211 | attack | Unauthorized connection attempt detected from IP address 193.112.173.211 to port 2220 [J] |
2020-01-24 01:47:47 |
| 106.12.43.124 | attackbotsspam | 2020-01-23T17:36:52.776695shield sshd\[17504\]: Invalid user monitor from 106.12.43.124 port 50410 2020-01-23T17:36:52.781097shield sshd\[17504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.124 2020-01-23T17:36:54.187190shield sshd\[17504\]: Failed password for invalid user monitor from 106.12.43.124 port 50410 ssh2 2020-01-23T17:39:24.581439shield sshd\[18382\]: Invalid user user1 from 106.12.43.124 port 41908 2020-01-23T17:39:24.589042shield sshd\[18382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.124 |
2020-01-24 01:47:01 |
| 222.186.31.166 | attackspam | Unauthorized connection attempt detected from IP address 222.186.31.166 to port 22 [T] |
2020-01-24 02:04:11 |
| 49.232.163.88 | attackbotsspam | Jan 21 22:21:51 h2570396 sshd[12867]: Failed password for invalid user ac from 49.232.163.88 port 45884 ssh2 Jan 21 22:21:51 h2570396 sshd[12867]: Received disconnect from 49.232.163.88: 11: Bye Bye [preauth] Jan 21 22:41:45 h2570396 sshd[14035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.163.88 user=r.r Jan 21 22:41:46 h2570396 sshd[14035]: Failed password for r.r from 49.232.163.88 port 34576 ssh2 Jan 21 22:41:47 h2570396 sshd[14035]: Received disconnect from 49.232.163.88: 11: Bye Bye [preauth] Jan 21 22:50:26 h2570396 sshd[14493]: Failed password for invalid user ubuntu from 49.232.163.88 port 60648 ssh2 Jan 21 22:50:28 h2570396 sshd[14493]: Received disconnect from 49.232.163.88: 11: Bye Bye [preauth] Jan 21 22:54:09 h2570396 sshd[14715]: Failed password for invalid user teamspeak from 49.232.163.88 port 59566 ssh2 Jan 21 22:54:09 h2570396 sshd[14715]: Received disconnect from 49.232.163.88: 11: Bye Bye [preauth]........ ------------------------------- |
2020-01-24 02:05:00 |
| 104.254.92.242 | attackspambots | (From coats.weldon@yahoo.com) Would you like to submit your advertisement on 1000's of Advertising sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever! To find out more check out our site here: http://www.adsonautopilot.xyz |
2020-01-24 02:04:30 |
| 82.117.244.91 | attack | Very low quality (reply to GMail) 419/phishing. |
2020-01-24 02:00:29 |
| 58.56.33.221 | attackspam | Jan 23 14:14:17 firewall sshd[20849]: Failed password for root from 58.56.33.221 port 43957 ssh2 Jan 23 14:17:38 firewall sshd[20910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.33.221 user=root Jan 23 14:17:39 firewall sshd[20910]: Failed password for root from 58.56.33.221 port 55857 ssh2 ... |
2020-01-24 01:44:04 |
| 181.53.251.181 | attackspambots | Jan 23 07:24:05 php1 sshd\[19289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.53.251.181 user=root Jan 23 07:24:07 php1 sshd\[19289\]: Failed password for root from 181.53.251.181 port 48242 ssh2 Jan 23 07:27:10 php1 sshd\[19728\]: Invalid user reg from 181.53.251.181 Jan 23 07:27:10 php1 sshd\[19728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.53.251.181 Jan 23 07:27:12 php1 sshd\[19728\]: Failed password for invalid user reg from 181.53.251.181 port 44368 ssh2 |
2020-01-24 01:48:05 |