城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.249.104.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.249.104.89. IN A
;; AUTHORITY SECTION:
. 299 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:09:18 CST 2022
;; MSG SIZE rcvd: 106
89.104.249.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.104.249.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 198.23.189.18 | attackbots | Aug 27 15:12:56 icinga sshd[20126]: Failed password for root from 198.23.189.18 port 48837 ssh2 Aug 27 15:17:10 icinga sshd[20554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.189.18 ... |
2019-08-27 22:03:09 |
| 136.63.96.92 | attack | Aug 27 11:05:48 * sshd[22263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.63.96.92 Aug 27 11:05:49 * sshd[22263]: Failed password for invalid user fu from 136.63.96.92 port 40699 ssh2 |
2019-08-27 21:44:41 |
| 157.230.186.166 | attackbots | Aug 27 02:38:13 kapalua sshd\[13870\]: Invalid user angelika from 157.230.186.166 Aug 27 02:38:13 kapalua sshd\[13870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.186.166 Aug 27 02:38:16 kapalua sshd\[13870\]: Failed password for invalid user angelika from 157.230.186.166 port 35154 ssh2 Aug 27 02:42:12 kapalua sshd\[14364\]: Invalid user pssadmin from 157.230.186.166 Aug 27 02:42:12 kapalua sshd\[14364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.186.166 |
2019-08-27 20:57:06 |
| 49.234.233.164 | attackspam | Aug 27 11:02:17 legacy sshd[20008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164 Aug 27 11:02:19 legacy sshd[20008]: Failed password for invalid user ftpguest from 49.234.233.164 port 35436 ssh2 Aug 27 11:05:35 legacy sshd[20139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164 ... |
2019-08-27 22:01:29 |
| 106.248.41.245 | attackbots | Aug 27 09:57:11 hcbbdb sshd\[5928\]: Invalid user postgres from 106.248.41.245 Aug 27 09:57:11 hcbbdb sshd\[5928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245 Aug 27 09:57:13 hcbbdb sshd\[5928\]: Failed password for invalid user postgres from 106.248.41.245 port 47836 ssh2 Aug 27 10:01:59 hcbbdb sshd\[6578\]: Invalid user claudio from 106.248.41.245 Aug 27 10:01:59 hcbbdb sshd\[6578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245 |
2019-08-27 21:53:49 |
| 167.99.230.57 | attackbotsspam | Reported by AbuseIPDB proxy server. |
2019-08-27 21:28:36 |
| 41.190.92.194 | attackbotsspam | Aug 27 15:45:40 root sshd[14328]: Failed password for root from 41.190.92.194 port 51726 ssh2 Aug 27 15:53:56 root sshd[14378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.92.194 Aug 27 15:53:58 root sshd[14378]: Failed password for invalid user austin from 41.190.92.194 port 40248 ssh2 ... |
2019-08-27 22:09:14 |
| 23.129.64.161 | attack | Aug 27 14:41:59 vps647732 sshd[22924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.161 Aug 27 14:42:01 vps647732 sshd[22924]: Failed password for invalid user user from 23.129.64.161 port 61717 ssh2 ... |
2019-08-27 21:03:57 |
| 212.92.112.91 | attackspambots | 3389BruteforceStormFW23 |
2019-08-27 21:37:18 |
| 179.125.62.241 | attack | Aug 27 05:06:24 web1 postfix/smtpd[24786]: warning: unknown[179.125.62.241]: SASL PLAIN authentication failed: authentication failure ... |
2019-08-27 21:01:25 |
| 187.162.225.142 | attackspam | 19/8/27@05:05:54: FAIL: Alarm-Intrusion address from=187.162.225.142 ... |
2019-08-27 21:40:03 |
| 81.22.45.239 | attack | 08/27/2019-07:35:11.455592 81.22.45.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85 |
2019-08-27 21:17:21 |
| 117.198.98.233 | attack | Unauthorized connection attempt from IP address 117.198.98.233 on Port 445(SMB) |
2019-08-27 22:12:19 |
| 158.69.112.95 | attack | Aug 27 07:05:07 ny01 sshd[13447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95 Aug 27 07:05:09 ny01 sshd[13447]: Failed password for invalid user regina from 158.69.112.95 port 60962 ssh2 Aug 27 07:13:15 ny01 sshd[14858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95 |
2019-08-27 21:47:34 |
| 106.12.133.247 | attackbotsspam | Aug 27 09:56:57 plusreed sshd[31003]: Invalid user ftpuser from 106.12.133.247 ... |
2019-08-27 22:05:33 |