城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.222.99.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.222.99.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 13:58:05 CST 2025
;; MSG SIZE rcvd: 106
Host 213.99.222.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 213.99.222.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.209.124.237 | attackbotsspam | Sep 8 14:47:51 auw2 sshd\[25794\]: Invalid user postgres from 134.209.124.237 Sep 8 14:47:51 auw2 sshd\[25794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.124.237 Sep 8 14:47:52 auw2 sshd\[25794\]: Failed password for invalid user postgres from 134.209.124.237 port 51868 ssh2 Sep 8 14:52:06 auw2 sshd\[26179\]: Invalid user demo from 134.209.124.237 Sep 8 14:52:06 auw2 sshd\[26179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.124.237 |
2019-09-09 10:21:43 |
| 157.245.44.147 | attack | DATE:2019-09-08 21:27:37, IP:157.245.44.147, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-09-09 10:21:17 |
| 139.199.228.133 | attackbotsspam | Sep 9 01:54:08 SilenceServices sshd[9633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133 Sep 9 01:54:10 SilenceServices sshd[9633]: Failed password for invalid user 123456 from 139.199.228.133 port 63457 ssh2 Sep 9 01:57:18 SilenceServices sshd[11930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133 |
2019-09-09 10:30:17 |
| 220.181.108.119 | attack | Automatic report - Banned IP Access |
2019-09-09 10:37:21 |
| 123.108.47.83 | attackspam | Sep 9 04:19:07 saschabauer sshd[16282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.47.83 Sep 9 04:19:09 saschabauer sshd[16282]: Failed password for invalid user guest from 123.108.47.83 port 50880 ssh2 |
2019-09-09 10:40:03 |
| 5.55.90.222 | attack | [Sun Sep 08 16:27:19.065600 2019] [:error] [pid 229221] [client 5.55.90.222:46922] [client 5.55.90.222] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 18)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "127.0.0.1"] [uri "/cgi-bin/ViewLog.asp"] [unique_id "XXVWF8Oko6IxncScSWaZ@gAAAAY"] ... |
2019-09-09 10:42:14 |
| 61.148.194.162 | attackspambots | Sep 9 01:50:54 server sshd\[16906\]: Invalid user ftptest from 61.148.194.162 port 33046 Sep 9 01:50:54 server sshd\[16906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.194.162 Sep 9 01:50:56 server sshd\[16906\]: Failed password for invalid user ftptest from 61.148.194.162 port 33046 ssh2 Sep 9 01:54:07 server sshd\[21258\]: Invalid user 123456 from 61.148.194.162 port 59532 Sep 9 01:54:07 server sshd\[21258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.194.162 |
2019-09-09 10:34:12 |
| 103.56.113.69 | attack | Sep 9 03:52:16 xxxxxxx0 sshd[19778]: Invalid user steam from 103.56.113.69 port 44585 Sep 9 03:52:16 xxxxxxx0 sshd[19778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69 Sep 9 03:52:19 xxxxxxx0 sshd[19778]: Failed password for invalid user steam from 103.56.113.69 port 44585 ssh2 Sep 9 04:06:16 xxxxxxx0 sshd[14794]: Invalid user minecraft from 103.56.113.69 port 46835 Sep 9 04:06:16 xxxxxxx0 sshd[14794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.56.113.69 |
2019-09-09 10:35:42 |
| 192.166.219.125 | attack | Sep 9 00:57:58 markkoudstaal sshd[18231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.166.219.125 Sep 9 00:58:00 markkoudstaal sshd[18231]: Failed password for invalid user scpuser from 192.166.219.125 port 32902 ssh2 Sep 9 01:02:34 markkoudstaal sshd[18649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.166.219.125 |
2019-09-09 09:59:48 |
| 50.76.95.188 | attackspam | 23/tcp 2323/tcp [2019-08-02/09-08]2pkt |
2019-09-09 10:36:48 |
| 218.98.40.138 | attackbots | Sep 8 22:02:52 TORMINT sshd\[473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.138 user=root Sep 8 22:02:54 TORMINT sshd\[473\]: Failed password for root from 218.98.40.138 port 13058 ssh2 Sep 8 22:02:57 TORMINT sshd\[473\]: Failed password for root from 218.98.40.138 port 13058 ssh2 ... |
2019-09-09 10:06:17 |
| 167.71.132.134 | attackbotsspam | Sep 8 09:55:00 lcprod sshd\[9643\]: Invalid user robot from 167.71.132.134 Sep 8 09:55:00 lcprod sshd\[9643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.132.134 Sep 8 09:55:01 lcprod sshd\[9643\]: Failed password for invalid user robot from 167.71.132.134 port 54592 ssh2 Sep 8 09:58:50 lcprod sshd\[10086\]: Invalid user hduser from 167.71.132.134 Sep 8 09:58:50 lcprod sshd\[10086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.132.134 |
2019-09-09 10:17:43 |
| 185.98.225.15 | attackspambots | Automatic report - Port Scan Attack |
2019-09-09 10:28:51 |
| 106.75.36.229 | attackbots | Sep 9 01:47:45 vps01 sshd[9836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.36.229 Sep 9 01:47:47 vps01 sshd[9836]: Failed password for invalid user itadmin from 106.75.36.229 port 57952 ssh2 |
2019-09-09 10:18:41 |
| 134.175.39.108 | attackspambots | Sep 9 01:44:16 SilenceServices sshd[1827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108 Sep 9 01:44:18 SilenceServices sshd[1827]: Failed password for invalid user d@n13l from 134.175.39.108 port 36806 ssh2 Sep 9 01:48:49 SilenceServices sshd[5507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108 |
2019-09-09 10:07:09 |