城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.250.124.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.250.124.245. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:50:36 CST 2025
;; MSG SIZE rcvd: 107
245.124.250.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.124.250.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 149.56.98.93 | attack | 2019-06-26T17:24:41.447637wiz-ks3 sshd[19028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-149-56-98.net user=root 2019-06-26T17:24:42.991511wiz-ks3 sshd[19028]: Failed password for root from 149.56.98.93 port 36566 ssh2 2019-06-26T17:24:59.476789wiz-ks3 sshd[19030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-149-56-98.net user=bin 2019-06-26T17:25:01.492296wiz-ks3 sshd[19030]: Failed password for bin from 149.56.98.93 port 40424 ssh2 2019-06-26T17:25:18.509051wiz-ks3 sshd[19032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-149-56-98.net user=daemon 2019-06-26T17:25:20.798821wiz-ks3 sshd[19032]: Failed password for daemon from 149.56.98.93 port 44228 ssh2 2019-06-26T17:25:36.134905wiz-ks3 sshd[19034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-149-56-98.net user=adm 2019-06-26T17:25:37.894682wiz-ks3 sshd[19 |
2019-07-20 10:50:52 |
| 122.195.200.36 | attack | 2019-07-20T02:35:15.463025hub.schaetter.us sshd\[5143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.36 user=root 2019-07-20T02:35:17.385906hub.schaetter.us sshd\[5143\]: Failed password for root from 122.195.200.36 port 39223 ssh2 2019-07-20T02:35:19.818502hub.schaetter.us sshd\[5143\]: Failed password for root from 122.195.200.36 port 39223 ssh2 2019-07-20T02:35:22.006705hub.schaetter.us sshd\[5143\]: Failed password for root from 122.195.200.36 port 39223 ssh2 2019-07-20T02:35:24.790962hub.schaetter.us sshd\[5145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.36 user=root ... |
2019-07-20 10:54:25 |
| 122.195.200.148 | attack | Jul 20 04:43:49 minden010 sshd[30341]: Failed password for root from 122.195.200.148 port 17943 ssh2 Jul 20 04:43:52 minden010 sshd[30341]: Failed password for root from 122.195.200.148 port 17943 ssh2 Jul 20 04:43:54 minden010 sshd[30341]: Failed password for root from 122.195.200.148 port 17943 ssh2 ... |
2019-07-20 10:44:23 |
| 43.249.192.47 | attack | Trying ports that it shouldn't be. |
2019-07-20 10:41:47 |
| 72.75.217.132 | attackbotsspam | Jul 20 04:40:44 h2177944 sshd\[7333\]: Invalid user prueba1 from 72.75.217.132 port 42652 Jul 20 04:40:44 h2177944 sshd\[7333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.75.217.132 Jul 20 04:40:45 h2177944 sshd\[7333\]: Failed password for invalid user prueba1 from 72.75.217.132 port 42652 ssh2 Jul 20 04:45:23 h2177944 sshd\[7419\]: Invalid user sales from 72.75.217.132 port 40672 ... |
2019-07-20 11:01:29 |
| 190.64.68.181 | attackbotsspam | Jul 20 04:37:46 OPSO sshd\[19396\]: Invalid user ec2-user from 190.64.68.181 port 58369 Jul 20 04:37:46 OPSO sshd\[19396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.181 Jul 20 04:37:49 OPSO sshd\[19396\]: Failed password for invalid user ec2-user from 190.64.68.181 port 58369 ssh2 Jul 20 04:43:48 OPSO sshd\[19889\]: Invalid user lydie from 190.64.68.181 port 43553 Jul 20 04:43:48 OPSO sshd\[19889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.181 |
2019-07-20 11:06:22 |
| 222.143.242.69 | attack | Jul 20 04:24:35 vps691689 sshd[11470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.143.242.69 Jul 20 04:24:38 vps691689 sshd[11470]: Failed password for invalid user openerp from 222.143.242.69 port 39710 ssh2 Jul 20 04:28:56 vps691689 sshd[11523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.143.242.69 ... |
2019-07-20 10:42:37 |
| 106.51.33.29 | attackspam | Jul 20 04:41:25 localhost sshd\[7939\]: Invalid user nishi from 106.51.33.29 port 53522 Jul 20 04:41:25 localhost sshd\[7939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.33.29 Jul 20 04:41:27 localhost sshd\[7939\]: Failed password for invalid user nishi from 106.51.33.29 port 53522 ssh2 |
2019-07-20 10:51:13 |
| 110.147.220.234 | attack | Jul 20 03:09:50 localhost sshd\[9254\]: Invalid user pi from 110.147.220.234 port 34836 Jul 20 03:09:51 localhost sshd\[9255\]: Invalid user pi from 110.147.220.234 port 34838 Jul 20 03:09:51 localhost sshd\[9254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.147.220.234 ... |
2019-07-20 11:10:06 |
| 95.60.133.70 | attackbotsspam | Triggered by Fail2Ban |
2019-07-20 10:32:00 |
| 92.11.85.58 | attack | Jul 20 09:27:25 webhost01 sshd[31539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.11.85.58 Jul 20 09:27:27 webhost01 sshd[31539]: Failed password for invalid user nadine from 92.11.85.58 port 54404 ssh2 ... |
2019-07-20 10:33:30 |
| 125.89.70.44 | attackbots | 19/7/19@21:37:42: FAIL: Alarm-Intrusion address from=125.89.70.44 ... |
2019-07-20 10:26:23 |
| 128.199.242.84 | attackspam | 2019-07-20T01:37:10.983104abusebot.cloudsearch.cf sshd\[27662\]: Invalid user aufstellungsort from 128.199.242.84 port 50840 |
2019-07-20 10:49:35 |
| 153.36.232.36 | attack | Jul 20 04:03:50 * sshd[11098]: Failed password for root from 153.36.232.36 port 53839 ssh2 |
2019-07-20 10:43:51 |
| 200.76.203.231 | attackspambots | Automatic report - Port Scan Attack |
2019-07-20 10:55:54 |