城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.244.98.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.244.98.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:39:10 CST 2025
;; MSG SIZE rcvd: 105
94.98.244.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.98.244.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 79.7.217.174 | attack | Sep 20 15:57:38 dedicated sshd[22794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.217.174 user=root Sep 20 15:57:40 dedicated sshd[22794]: Failed password for root from 79.7.217.174 port 62967 ssh2 |
2019-09-21 02:06:59 |
| 123.52.17.190 | attackbotsspam | 445/tcp [2019-09-20]1pkt |
2019-09-21 02:03:41 |
| 142.93.163.125 | attackbotsspam | 2019-09-20T17:49:54.211256abusebot-5.cloudsearch.cf sshd\[16495\]: Invalid user test from 142.93.163.125 port 37630 |
2019-09-21 02:10:31 |
| 177.50.207.183 | attack | Sep 19 23:47:09 hanapaa sshd\[5847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.50.207.183 user=backup Sep 19 23:47:11 hanapaa sshd\[5847\]: Failed password for backup from 177.50.207.183 port 47286 ssh2 Sep 19 23:52:14 hanapaa sshd\[6298\]: Invalid user shuai from 177.50.207.183 Sep 19 23:52:14 hanapaa sshd\[6298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.50.207.183 Sep 19 23:52:16 hanapaa sshd\[6298\]: Failed password for invalid user shuai from 177.50.207.183 port 39592 ssh2 |
2019-09-21 02:19:17 |
| 181.28.60.154 | attackspam | Honeypot attack, port: 23, PTR: 154-60-28-181.fibertel.com.ar. |
2019-09-21 01:51:41 |
| 60.29.21.218 | attack | 3389BruteforceFW21 |
2019-09-21 02:31:47 |
| 131.0.95.237 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-09-21 01:54:26 |
| 36.229.34.201 | attackbotsspam | Honeypot attack, port: 23, PTR: 36-229-34-201.dynamic-ip.hinet.net. |
2019-09-21 02:06:12 |
| 222.165.146.122 | attack | Spam Timestamp : 20-Sep-19 09:16 BlockList Provider combined abuse (680) |
2019-09-21 01:59:40 |
| 110.164.205.133 | attackspam | 2019-09-20T18:14:59.784739abusebot-3.cloudsearch.cf sshd\[27429\]: Invalid user feroci from 110.164.205.133 port 62911 |
2019-09-21 02:20:48 |
| 87.247.48.94 | attackbotsspam | 0,64-01/24 [bc00/m11] concatform PostRequest-Spammer scoring: Durban01 |
2019-09-21 02:23:14 |
| 89.44.32.18 | attackspambots | Hack attempt |
2019-09-21 02:16:59 |
| 124.152.76.213 | attackbotsspam | Sep 20 06:11:31 ws22vmsma01 sshd[193715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.152.76.213 Sep 20 06:11:34 ws22vmsma01 sshd[193715]: Failed password for invalid user huaqi from 124.152.76.213 port 37674 ssh2 ... |
2019-09-21 02:11:00 |
| 139.59.77.237 | attackbotsspam | Sep 20 19:55:15 mail sshd\[22428\]: Invalid user cav from 139.59.77.237 port 39291 Sep 20 19:55:15 mail sshd\[22428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237 Sep 20 19:55:17 mail sshd\[22428\]: Failed password for invalid user cav from 139.59.77.237 port 39291 ssh2 Sep 20 19:59:33 mail sshd\[22865\]: Invalid user stefan from 139.59.77.237 port 59890 Sep 20 19:59:33 mail sshd\[22865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237 |
2019-09-21 02:09:30 |
| 45.55.38.39 | attackbots | Invalid user travel from 45.55.38.39 port 33938 |
2019-09-21 01:50:54 |