城市(city): unknown
省份(region): unknown
国家(country): Korea Republic of
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.4.139.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.4.139.91. IN A
;; AUTHORITY SECTION:
. 419 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 15:12:16 CST 2022
;; MSG SIZE rcvd: 104
Host 91.139.4.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.139.4.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.118.37.0 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-07 02:52:49 |
| 109.88.44.32 | attackbots | 19/11/6@09:36:27: FAIL: Alarm-SSH address from=109.88.44.32 19/11/6@09:36:28: FAIL: Alarm-SSH address from=109.88.44.32 ... |
2019-11-07 03:06:14 |
| 212.120.186.15 | attack | Brute force attempt |
2019-11-07 02:54:23 |
| 77.250.208.21 | attackspam | SSH bruteforce |
2019-11-07 02:49:19 |
| 203.82.42.90 | attack | Nov 6 17:23:19 sd-53420 sshd\[27635\]: Invalid user backupbackup from 203.82.42.90 Nov 6 17:23:19 sd-53420 sshd\[27635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.82.42.90 Nov 6 17:23:21 sd-53420 sshd\[27635\]: Failed password for invalid user backupbackup from 203.82.42.90 port 53114 ssh2 Nov 6 17:27:19 sd-53420 sshd\[27986\]: Invalid user cigars from 203.82.42.90 Nov 6 17:27:19 sd-53420 sshd\[27986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.82.42.90 ... |
2019-11-07 03:09:47 |
| 130.184.76.138 | attackbotsspam | Failed password for mysql from 130.184.76.138 port 50296 ssh2 |
2019-11-07 03:25:20 |
| 89.222.217.9 | attackspam | Chat Spam |
2019-11-07 03:13:00 |
| 110.72.27.202 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/110.72.27.202/ CN - 1H : (623) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4837 IP : 110.72.27.202 CIDR : 110.72.0.0/15 PREFIX COUNT : 1262 UNIQUE IP COUNT : 56665856 ATTACKS DETECTED ASN4837 : 1H - 10 3H - 23 6H - 55 12H - 106 24H - 216 DateTime : 2019-11-06 15:36:15 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-07 03:12:43 |
| 103.73.34.119 | attack | Automatic report - Port Scan Attack |
2019-11-07 03:04:46 |
| 131.221.97.70 | attack | Nov 6 14:27:07 localhost sshd\[47235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.97.70 user=root Nov 6 14:27:10 localhost sshd\[47235\]: Failed password for root from 131.221.97.70 port 34114 ssh2 Nov 6 14:31:55 localhost sshd\[47365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.97.70 user=root Nov 6 14:31:57 localhost sshd\[47365\]: Failed password for root from 131.221.97.70 port 44712 ssh2 Nov 6 14:36:35 localhost sshd\[47486\]: Invalid user hacker from 131.221.97.70 port 55314 ... |
2019-11-07 03:00:42 |
| 122.228.19.80 | attackspambots | 06.11.2019 18:33:38 Connection to port 7001 blocked by firewall |
2019-11-07 03:09:27 |
| 79.187.192.249 | attackbots | Nov 6 16:52:53 vps01 sshd[5910]: Failed password for root from 79.187.192.249 port 58538 ssh2 |
2019-11-07 02:59:58 |
| 85.144.226.170 | attackspambots | Nov 6 09:12:35 web1 sshd\[6295\]: Invalid user web from 85.144.226.170 Nov 6 09:12:35 web1 sshd\[6295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170 Nov 6 09:12:37 web1 sshd\[6295\]: Failed password for invalid user web from 85.144.226.170 port 53932 ssh2 Nov 6 09:16:37 web1 sshd\[6670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170 user=root Nov 6 09:16:39 web1 sshd\[6670\]: Failed password for root from 85.144.226.170 port 35226 ssh2 |
2019-11-07 03:18:42 |
| 185.74.4.189 | attackspambots | Nov 6 07:06:52 eddieflores sshd\[13498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 user=root Nov 6 07:06:54 eddieflores sshd\[13498\]: Failed password for root from 185.74.4.189 port 36340 ssh2 Nov 6 07:11:12 eddieflores sshd\[13915\]: Invalid user foxi from 185.74.4.189 Nov 6 07:11:12 eddieflores sshd\[13915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 Nov 6 07:11:14 eddieflores sshd\[13915\]: Failed password for invalid user foxi from 185.74.4.189 port 45068 ssh2 |
2019-11-07 02:54:59 |
| 181.49.254.230 | attackspam | Nov 6 17:17:51 server sshd\[17819\]: Invalid user dvr from 181.49.254.230 Nov 6 17:17:51 server sshd\[17819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.254.230 Nov 6 17:17:53 server sshd\[17819\]: Failed password for invalid user dvr from 181.49.254.230 port 37236 ssh2 Nov 6 17:35:52 server sshd\[23014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.254.230 user=root Nov 6 17:35:54 server sshd\[23014\]: Failed password for root from 181.49.254.230 port 34320 ssh2 ... |
2019-11-07 03:24:29 |