城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.239.203.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.239.203.164. IN A
;; AUTHORITY SECTION:
. 290 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:56:46 CST 2022
;; MSG SIZE rcvd: 107
164.203.239.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.203.239.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.99.12.24 | attack | Dec 31 07:44:10 XXX sshd[30451]: Invalid user hung from 192.99.12.24 port 54500 |
2020-01-01 09:05:08 |
| 218.241.251.217 | attack | Lines containing failures of 218.241.251.217 Dec 31 23:26:55 mailserver sshd[18730]: Invalid user ching from 218.241.251.217 port 2788 Dec 31 23:26:55 mailserver sshd[18730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.251.217 Dec 31 23:26:57 mailserver sshd[18730]: Failed password for invalid user ching from 218.241.251.217 port 2788 ssh2 Dec 31 23:26:57 mailserver sshd[18730]: Received disconnect from 218.241.251.217 port 2788:11: Bye Bye [preauth] Dec 31 23:26:57 mailserver sshd[18730]: Disconnected from invalid user ching 218.241.251.217 port 2788 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=218.241.251.217 |
2020-01-01 09:22:13 |
| 92.86.127.175 | attackspambots | Invalid user camino from 92.86.127.175 port 53346 |
2020-01-01 09:11:56 |
| 123.24.101.67 | attackbotsspam | Lines containing failures of 123.24.101.67 Dec 31 23:29:03 shared01 sshd[13141]: Invalid user monhostnameor from 123.24.101.67 port 52151 Dec 31 23:29:04 shared01 sshd[13141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.24.101.67 Dec 31 23:29:05 shared01 sshd[13141]: Failed password for invalid user monhostnameor from 123.24.101.67 port 52151 ssh2 Dec 31 23:29:06 shared01 sshd[13141]: Connection closed by invalid user monhostnameor 123.24.101.67 port 52151 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.24.101.67 |
2020-01-01 09:12:29 |
| 206.189.156.198 | attack | Jan 1 00:55:41 vps691689 sshd[29703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.198 Jan 1 00:55:43 vps691689 sshd[29703]: Failed password for invalid user deploy5 from 206.189.156.198 port 53722 ssh2 ... |
2020-01-01 08:57:23 |
| 201.47.181.123 | attackspambots | Automatic report - Port Scan Attack |
2020-01-01 09:08:27 |
| 172.105.239.183 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-01-01 08:52:09 |
| 5.151.200.42 | attack | Dec 31 23:45:07 xeon sshd[12464]: Failed password for invalid user http from 5.151.200.42 port 54570 ssh2 |
2020-01-01 08:55:00 |
| 61.81.131.75 | attackspam | firewall-block, port(s): 4567/tcp |
2020-01-01 08:58:35 |
| 66.249.79.51 | attack | Automatic report - Banned IP Access |
2020-01-01 09:13:39 |
| 164.132.98.75 | attackbotsspam | 2020-01-01T04:56:43.018754shield sshd\[17844\]: Invalid user seno from 164.132.98.75 port 56157 2020-01-01T04:56:43.024284shield sshd\[17844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.ip-164-132-98.eu 2020-01-01T04:56:44.716650shield sshd\[17844\]: Failed password for invalid user seno from 164.132.98.75 port 56157 ssh2 2020-01-01T04:58:55.587130shield sshd\[18045\]: Invalid user backup from 164.132.98.75 port 39220 2020-01-01T04:58:55.593155shield sshd\[18045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.ip-164-132-98.eu |
2020-01-01 13:02:27 |
| 152.136.122.130 | attackspambots | Automatic report - Banned IP Access |
2020-01-01 08:57:38 |
| 109.229.248.206 | attack | Unauthorised access (Jan 1) SRC=109.229.248.206 LEN=40 PREC=0x20 TTL=53 ID=5360 TCP DPT=8080 WINDOW=56776 SYN Unauthorised access (Dec 31) SRC=109.229.248.206 LEN=40 PREC=0x20 TTL=53 ID=58432 TCP DPT=8080 WINDOW=15616 SYN Unauthorised access (Dec 31) SRC=109.229.248.206 LEN=40 PREC=0x20 TTL=53 ID=35372 TCP DPT=8080 WINDOW=56776 SYN |
2020-01-01 13:02:45 |
| 62.34.36.202 | attackspambots | Dec 30 12:37:51 HOST sshd[2517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-34-36-202.abo.bbox.fr Dec 30 12:37:52 HOST sshd[2517]: Failed password for invalid user netscreen from 62.34.36.202 port 51304 ssh2 Dec 30 12:37:52 HOST sshd[2517]: Connection closed by 62.34.36.202 [preauth] Dec 30 12:37:53 HOST sshd[2519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=i15-lef01-t2-62-34-36-202.ft.lns.abo.bbox.fr Dec 30 12:37:55 HOST sshd[2519]: Failed password for invalid user nexthink from 62.34.36.202 port 51662 ssh2 Dec 30 12:37:55 HOST sshd[2519]: Connection closed by 62.34.36.202 [preauth] Dec 30 12:37:55 HOST sshd[2521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=i15-lef01-t2-62-34-36-202.ft.lns.abo.bbox.fr Dec 30 12:37:57 HOST sshd[2521]: Failed password for invalid user osbash from 62.34.36.202 port 51726 ssh2 Dec 30 12:37:57 HOST sshd[........ ------------------------------- |
2020-01-01 09:11:22 |
| 116.196.120.101 | attackbots | Invalid user serisky from 116.196.120.101 port 57841 |
2020-01-01 09:00:58 |