城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.250.113.210 | attackspam | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-09-17 19:45:20 |
| 14.250.158.172 | attack | Unauthorized connection attempt from IP address 14.250.158.172 on Port 445(SMB) |
2020-08-18 02:58:08 |
| 14.250.165.224 | attackspam | Unauthorized connection attempt detected from IP address 14.250.165.224 to port 445 [T] |
2020-07-22 03:09:13 |
| 14.250.132.189 | attackspambots | Unauthorized connection attempt detected from IP address 14.250.132.189 to port 445 [T] |
2020-07-22 02:47:45 |
| 14.250.105.62 | attackbots | Unauthorized connection attempt from IP address 14.250.105.62 on Port 445(SMB) |
2020-07-15 15:08:39 |
| 14.250.162.227 | attackbots | Unauthorized connection attempt from IP address 14.250.162.227 on Port 445(SMB) |
2020-07-09 01:40:35 |
| 14.250.19.93 | attackspambots | (ftpd) Failed FTP login from 14.250.19.93 (VN/Vietnam/static.vnpt.vn): 10 in the last 3600 secs; ID: rub |
2020-06-27 16:18:33 |
| 14.250.12.218 | attack | Unauthorised access (May 26) SRC=14.250.12.218 LEN=52 TTL=51 ID=25705 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-27 06:49:57 |
| 14.250.113.183 | attackbotsspam | Invalid user admin from 14.250.113.183 port 58974 |
2020-05-22 04:17:51 |
| 14.250.122.219 | attackbotsspam | Feb 14 06:31:49 pi sshd[31968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.250.122.219 Feb 14 06:31:52 pi sshd[31968]: Failed password for invalid user database from 14.250.122.219 port 63211 ssh2 |
2020-03-14 04:41:16 |
| 14.250.180.122 | attackbots | Feb 14 02:53:35 pi sshd[30233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.250.180.122 Feb 14 02:53:37 pi sshd[30233]: Failed password for invalid user router from 14.250.180.122 port 61056 ssh2 |
2020-03-14 04:38:01 |
| 14.250.163.173 | attackspambots | Email rejected due to spam filtering |
2020-03-09 14:42:08 |
| 14.250.103.0 | attack | Unauthorized connection attempt detected from IP address 14.250.103.0 to port 23 [J] |
2020-03-02 19:19:03 |
| 14.250.162.13 | attackspam | Autoban 14.250.162.13 AUTH/CONNECT |
2020-02-27 21:50:29 |
| 14.250.131.70 | attack | unauthorized connection attempt |
2020-02-26 21:00:11 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.250.1.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14581
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.250.1.20. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:41:11 CST 2022
;; MSG SIZE rcvd: 104
20.1.250.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.1.250.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 206.189.132.204 | attackbotsspam | Jan 11 06:21:32 lanister sshd[27699]: Invalid user applmgr from 206.189.132.204 Jan 11 06:21:34 lanister sshd[27699]: Failed password for invalid user applmgr from 206.189.132.204 port 59716 ssh2 Jan 11 06:23:56 lanister sshd[27710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.204 user=root Jan 11 06:23:58 lanister sshd[27710]: Failed password for root from 206.189.132.204 port 51484 ssh2 ... |
2020-01-11 19:53:41 |
| 180.183.248.109 | attackbots | Unauthorized connection attempt from IP address 180.183.248.109 on Port 445(SMB) |
2020-01-11 19:31:56 |
| 62.210.205.155 | attackspambots | Jan 11 09:11:39 host sshd[63489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-205-155.rev.poneytelecom.eu user=root Jan 11 09:11:41 host sshd[63489]: Failed password for root from 62.210.205.155 port 44128 ssh2 ... |
2020-01-11 19:55:10 |
| 2.58.29.146 | attackbotsspam | 0,28-14/08 [bc01/m09] PostRequest-Spammer scoring: lisboa |
2020-01-11 19:31:40 |
| 106.13.140.110 | attack | Jan 11 06:15:49 meumeu sshd[5083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110 Jan 11 06:15:51 meumeu sshd[5083]: Failed password for invalid user zewoo_admin% from 106.13.140.110 port 48292 ssh2 Jan 11 06:19:55 meumeu sshd[5583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110 ... |
2020-01-11 19:27:47 |
| 202.102.79.232 | attack | Jan 11 06:55:19 *** sshd[6740]: Invalid user segelinde from 202.102.79.232 |
2020-01-11 20:02:08 |
| 160.153.147.37 | attackbots | Automatic report - XMLRPC Attack |
2020-01-11 19:29:58 |
| 176.235.248.186 | attackspam | unauthorized connection attempt |
2020-01-11 19:40:23 |
| 143.176.230.43 | attackspambots | 3x Failed Password |
2020-01-11 19:50:00 |
| 197.156.80.3 | attackbots | Unauthorized connection attempt from IP address 197.156.80.3 on Port 445(SMB) |
2020-01-11 20:00:41 |
| 114.67.235.72 | attack | Jan 11 11:22:55 vpn01 sshd[19255]: Failed password for root from 114.67.235.72 port 49512 ssh2 ... |
2020-01-11 19:42:34 |
| 93.78.205.197 | attack | email spam |
2020-01-11 19:39:31 |
| 198.50.159.33 | attackspam | Jan 11 02:45:01 server sshd\[26495\]: Failed password for invalid user scaner from 198.50.159.33 port 35042 ssh2 Jan 11 14:07:49 server sshd\[10784\]: Invalid user ftpuser from 198.50.159.33 Jan 11 14:07:49 server sshd\[10784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip33.ip-198-50-159.net Jan 11 14:07:52 server sshd\[10784\]: Failed password for invalid user ftpuser from 198.50.159.33 port 35014 ssh2 Jan 11 14:09:41 server sshd\[11103\]: Invalid user scaner from 198.50.159.33 Jan 11 14:09:41 server sshd\[11103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip33.ip-198-50-159.net ... |
2020-01-11 19:26:46 |
| 106.13.19.75 | attack | $f2bV_matches |
2020-01-11 19:51:06 |
| 49.145.106.162 | attackbots | Unauthorized connection attempt from IP address 49.145.106.162 on Port 445(SMB) |
2020-01-11 20:03:04 |