城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.238.212.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.238.212.65. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 00:53:49 CST 2025
;; MSG SIZE rcvd: 106
65.212.238.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
65.212.238.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.20.169.27 | attackspambots | 445/tcp [2019-11-01]1pkt |
2019-11-02 05:17:51 |
| 81.4.106.78 | attackbots | Oct 31 14:02:37 mx01 sshd[12833]: Invalid user a from 81.4.106.78 Oct 31 14:02:37 mx01 sshd[12833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.78 Oct 31 14:02:39 mx01 sshd[12833]: Failed password for invalid user a from 81.4.106.78 port 38944 ssh2 Oct 31 14:02:39 mx01 sshd[12833]: Received disconnect from 81.4.106.78: 11: Bye Bye [preauth] Oct 31 14:12:29 mx01 sshd[13737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.78 user=r.r Oct 31 14:12:31 mx01 sshd[13737]: Failed password for r.r from 81.4.106.78 port 55960 ssh2 Oct 31 14:12:31 mx01 sshd[13737]: Received disconnect from 81.4.106.78: 11: Bye Bye [preauth] Oct 31 14:16:09 mx01 sshd[14149]: Invalid user ftpuser from 81.4.106.78 Oct 31 14:16:09 mx01 sshd[14149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.78 Oct 31 14:16:11 mx01 sshd[14149]: Failed password f........ ------------------------------- |
2019-11-02 05:35:39 |
| 91.195.46.39 | attackbotsspam | 3389BruteforceFW21 |
2019-11-02 05:46:03 |
| 159.89.177.46 | attackbotsspam | Nov 1 16:14:50 lanister sshd[18192]: Invalid user oracle from 159.89.177.46 Nov 1 16:14:50 lanister sshd[18192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.177.46 Nov 1 16:14:50 lanister sshd[18192]: Invalid user oracle from 159.89.177.46 Nov 1 16:14:51 lanister sshd[18192]: Failed password for invalid user oracle from 159.89.177.46 port 56338 ssh2 ... |
2019-11-02 05:38:56 |
| 187.75.101.233 | attackbotsspam | 8080/tcp [2019-11-01]1pkt |
2019-11-02 05:19:35 |
| 175.37.33.88 | attack | RDP Bruteforce |
2019-11-02 05:39:55 |
| 166.111.156.162 | attackspambots | Unauthorized connection attempt from IP address 166.111.156.162 on Port 445(SMB) |
2019-11-02 05:25:41 |
| 192.81.216.31 | attackbots | Nov 1 22:35:05 lnxded63 sshd[29739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.216.31 |
2019-11-02 05:37:41 |
| 106.0.62.26 | attack | proto=tcp . spt=34038 . dpt=25 . (Found on Dark List de Nov 01) (679) |
2019-11-02 05:54:30 |
| 42.51.204.24 | attackspambots | Nov 1 23:21:20 sauna sshd[163333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.204.24 Nov 1 23:21:22 sauna sshd[163333]: Failed password for invalid user smceachern from 42.51.204.24 port 42194 ssh2 ... |
2019-11-02 05:30:09 |
| 104.245.144.45 | attack | (From linker.kathryn@gmail.com) Do you want to promote your advertisement on thousands of advertising sites monthly? One tiny investment every month will get you virtually unlimited traffic to your site forever! Check out our site for details: http://morebusiness.myadsubmissions.xyz |
2019-11-02 05:20:20 |
| 84.200.211.112 | attackbotsspam | Brute force SMTP login attempted. ... |
2019-11-02 05:27:31 |
| 123.206.17.68 | attack | Nov 2 03:16:34 lcl-usvr-02 sshd[8263]: Invalid user 1 from 123.206.17.68 port 33940 Nov 2 03:16:34 lcl-usvr-02 sshd[8263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.17.68 Nov 2 03:16:34 lcl-usvr-02 sshd[8263]: Invalid user 1 from 123.206.17.68 port 33940 Nov 2 03:16:36 lcl-usvr-02 sshd[8263]: Failed password for invalid user 1 from 123.206.17.68 port 33940 ssh2 Nov 2 03:23:10 lcl-usvr-02 sshd[9700]: Invalid user sex4pl from 123.206.17.68 port 46526 ... |
2019-11-02 05:36:08 |
| 187.111.160.8 | attack | Brute force attempt |
2019-11-02 05:29:42 |
| 200.31.27.148 | attack | Unauthorized connection attempt from IP address 200.31.27.148 on Port 445(SMB) |
2019-11-02 05:24:29 |