城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.255.149.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.255.149.121. IN A
;; AUTHORITY SECTION:
. 241 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 18:04:20 CST 2022
;; MSG SIZE rcvd: 107
121.149.255.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
121.149.255.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 209.97.138.167 | attackbotsspam | 2020-07-04T09:17:46.252059galaxy.wi.uni-potsdam.de sshd[22618]: Invalid user guest2 from 209.97.138.167 port 55274 2020-07-04T09:17:46.257091galaxy.wi.uni-potsdam.de sshd[22618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.138.167 2020-07-04T09:17:46.252059galaxy.wi.uni-potsdam.de sshd[22618]: Invalid user guest2 from 209.97.138.167 port 55274 2020-07-04T09:17:48.576338galaxy.wi.uni-potsdam.de sshd[22618]: Failed password for invalid user guest2 from 209.97.138.167 port 55274 ssh2 2020-07-04T09:20:40.011872galaxy.wi.uni-potsdam.de sshd[22982]: Invalid user saq from 209.97.138.167 port 52702 2020-07-04T09:20:40.016991galaxy.wi.uni-potsdam.de sshd[22982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.138.167 2020-07-04T09:20:40.011872galaxy.wi.uni-potsdam.de sshd[22982]: Invalid user saq from 209.97.138.167 port 52702 2020-07-04T09:20:42.556969galaxy.wi.uni-potsdam.de sshd[22982]: Failed p ... |
2020-07-04 15:46:45 |
| 45.177.68.245 | attack | Jul 4 08:20:48 ajax sshd[27864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.177.68.245 Jul 4 08:20:49 ajax sshd[27864]: Failed password for invalid user vic from 45.177.68.245 port 47424 ssh2 |
2020-07-04 15:41:57 |
| 171.25.193.77 | attackspambots | Hit honeypot r. |
2020-07-04 15:21:06 |
| 46.151.212.45 | attack | 2020-07-03T19:29:57.709357devel sshd[3398]: Failed password for invalid user ap from 46.151.212.45 port 55832 ssh2 2020-07-03T19:48:25.555410devel sshd[7330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.212.45 user=root 2020-07-03T19:48:27.267866devel sshd[7330]: Failed password for root from 46.151.212.45 port 45728 ssh2 |
2020-07-04 15:18:35 |
| 218.92.0.185 | attackspambots | Jul 4 09:20:59 eventyay sshd[23710]: Failed password for root from 218.92.0.185 port 42828 ssh2 Jul 4 09:21:11 eventyay sshd[23710]: error: maximum authentication attempts exceeded for root from 218.92.0.185 port 42828 ssh2 [preauth] Jul 4 09:21:18 eventyay sshd[23716]: Failed password for root from 218.92.0.185 port 8813 ssh2 ... |
2020-07-04 15:28:45 |
| 68.183.42.230 | attackbots | Jul 4 07:47:25 game-panel sshd[16984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.42.230 Jul 4 07:47:26 game-panel sshd[16984]: Failed password for invalid user jfrog from 68.183.42.230 port 35980 ssh2 Jul 4 07:51:08 game-panel sshd[17196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.42.230 |
2020-07-04 15:54:48 |
| 51.68.44.154 | attack | Jul 4 09:04:27 ns392434 sshd[4271]: Invalid user hxz from 51.68.44.154 port 38155 Jul 4 09:04:27 ns392434 sshd[4271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.154 Jul 4 09:04:27 ns392434 sshd[4271]: Invalid user hxz from 51.68.44.154 port 38155 Jul 4 09:04:29 ns392434 sshd[4271]: Failed password for invalid user hxz from 51.68.44.154 port 38155 ssh2 Jul 4 09:17:45 ns392434 sshd[4703]: Invalid user gemma from 51.68.44.154 port 56064 Jul 4 09:17:45 ns392434 sshd[4703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.154 Jul 4 09:17:45 ns392434 sshd[4703]: Invalid user gemma from 51.68.44.154 port 56064 Jul 4 09:17:47 ns392434 sshd[4703]: Failed password for invalid user gemma from 51.68.44.154 port 56064 ssh2 Jul 4 09:21:03 ns392434 sshd[4720]: Invalid user mininet from 51.68.44.154 port 54723 |
2020-07-04 15:27:22 |
| 115.84.91.155 | attack | (imapd) Failed IMAP login from 115.84.91.155 (LA/Laos/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 4 11:50:58 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user= |
2020-07-04 15:31:33 |
| 159.203.112.185 | attack | Jul 4 09:17:19 vps687878 sshd\[29024\]: Invalid user shivam from 159.203.112.185 port 54260 Jul 4 09:17:19 vps687878 sshd\[29024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.112.185 Jul 4 09:17:21 vps687878 sshd\[29024\]: Failed password for invalid user shivam from 159.203.112.185 port 54260 ssh2 Jul 4 09:20:13 vps687878 sshd\[29252\]: Invalid user qwy from 159.203.112.185 port 51672 Jul 4 09:20:13 vps687878 sshd\[29252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.112.185 ... |
2020-07-04 15:32:33 |
| 45.119.212.105 | attack | Jul 4 09:16:18 vmd26974 sshd[3956]: Failed password for root from 45.119.212.105 port 56426 ssh2 ... |
2020-07-04 15:32:05 |
| 177.152.124.23 | attack | Jul 4 00:10:17 l02a sshd[8359]: Invalid user sunrise from 177.152.124.23 Jul 4 00:10:18 l02a sshd[8359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.23 Jul 4 00:10:17 l02a sshd[8359]: Invalid user sunrise from 177.152.124.23 Jul 4 00:10:20 l02a sshd[8359]: Failed password for invalid user sunrise from 177.152.124.23 port 60392 ssh2 |
2020-07-04 15:19:16 |
| 94.23.222.147 | attackbots | Jul 4 09:20:53 b-vps wordpress(gpfans.cz)[5496]: Authentication attempt for unknown user buchtic from 94.23.222.147 ... |
2020-07-04 15:37:20 |
| 112.85.42.180 | attackspambots | Jul 4 15:42:18 bacztwo sshd[19722]: error: PAM: Authentication failure for root from 112.85.42.180 Jul 4 15:42:22 bacztwo sshd[19722]: error: PAM: Authentication failure for root from 112.85.42.180 Jul 4 15:42:18 bacztwo sshd[19722]: error: PAM: Authentication failure for root from 112.85.42.180 Jul 4 15:42:22 bacztwo sshd[19722]: error: PAM: Authentication failure for root from 112.85.42.180 Jul 4 15:42:18 bacztwo sshd[19722]: error: PAM: Authentication failure for root from 112.85.42.180 Jul 4 15:42:22 bacztwo sshd[19722]: error: PAM: Authentication failure for root from 112.85.42.180 ... |
2020-07-04 15:45:01 |
| 222.186.169.194 | attackbotsspam | Jul 4 09:27:09 minden010 sshd[32115]: Failed password for root from 222.186.169.194 port 59166 ssh2 Jul 4 09:27:12 minden010 sshd[32115]: Failed password for root from 222.186.169.194 port 59166 ssh2 Jul 4 09:27:15 minden010 sshd[32115]: Failed password for root from 222.186.169.194 port 59166 ssh2 Jul 4 09:27:20 minden010 sshd[32115]: Failed password for root from 222.186.169.194 port 59166 ssh2 ... |
2020-07-04 15:28:19 |
| 202.79.46.153 | attack | VNC brute force attack detected by fail2ban |
2020-07-04 15:54:02 |