城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.253.175.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20563
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.253.175.14. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 153 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 16:18:23 CST 2025
;; MSG SIZE rcvd: 107
Host 14.175.253.141.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.175.253.141.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.44.243.160 | attack | Dec 18 13:33:21 wbs sshd\[3028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-142-44-243.net user=root Dec 18 13:33:22 wbs sshd\[3028\]: Failed password for root from 142.44.243.160 port 51799 ssh2 Dec 18 13:38:48 wbs sshd\[3527\]: Invalid user server from 142.44.243.160 Dec 18 13:38:48 wbs sshd\[3527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-142-44-243.net Dec 18 13:38:50 wbs sshd\[3527\]: Failed password for invalid user server from 142.44.243.160 port 56154 ssh2 |
2019-12-19 08:27:26 |
| 41.139.132.119 | attack | Dec 18 14:36:27 tdfoods sshd\[32036\]: Invalid user server from 41.139.132.119 Dec 18 14:36:27 tdfoods sshd\[32036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41-139-132-119.safaricombusiness.co.ke Dec 18 14:36:29 tdfoods sshd\[32036\]: Failed password for invalid user server from 41.139.132.119 port 34772 ssh2 Dec 18 14:43:36 tdfoods sshd\[327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41-139-132-119.safaricombusiness.co.ke user=root Dec 18 14:43:37 tdfoods sshd\[327\]: Failed password for root from 41.139.132.119 port 47572 ssh2 |
2019-12-19 08:50:41 |
| 90.113.198.248 | attackbotsspam | php WP PHPmyadamin ABUSE blocked for 12h |
2019-12-19 08:17:37 |
| 190.5.199.83 | attackspambots | Dec 18 23:32:38 loxhost sshd\[6451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.199.83 user=root Dec 18 23:32:40 loxhost sshd\[6451\]: Failed password for root from 190.5.199.83 port 57102 ssh2 Dec 18 23:38:31 loxhost sshd\[6642\]: Invalid user gerrit from 190.5.199.83 port 38276 Dec 18 23:38:31 loxhost sshd\[6642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.199.83 Dec 18 23:38:33 loxhost sshd\[6642\]: Failed password for invalid user gerrit from 190.5.199.83 port 38276 ssh2 ... |
2019-12-19 08:45:48 |
| 172.105.150.29 | attackbotsspam | Unauthorized connection attempt detected from IP address 172.105.150.29 to port 1434 |
2019-12-19 08:18:28 |
| 49.235.137.201 | attack | Dec 19 00:59:48 vtv3 sshd[21676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.201 Dec 19 00:59:50 vtv3 sshd[21676]: Failed password for invalid user com from 49.235.137.201 port 55562 ssh2 Dec 19 01:05:59 vtv3 sshd[24788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.201 Dec 19 01:16:55 vtv3 sshd[29988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.201 Dec 19 01:16:56 vtv3 sshd[29988]: Failed password for invalid user okimi from 49.235.137.201 port 34062 ssh2 Dec 19 01:22:21 vtv3 sshd[32606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.201 Dec 19 01:33:07 vtv3 sshd[5058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.137.201 Dec 19 01:33:09 vtv3 sshd[5058]: Failed password for invalid user !QAZ@WSX123 from 49.235.137.201 port 40626 ssh2 Dec 1 |
2019-12-19 08:48:29 |
| 172.81.204.249 | attackspam | Dec 19 01:18:45 ns381471 sshd[9461]: Failed password for root from 172.81.204.249 port 45854 ssh2 |
2019-12-19 08:47:55 |
| 77.237.77.207 | attackspam | Dec 19 00:53:44 markkoudstaal sshd[6677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.237.77.207 Dec 19 00:53:46 markkoudstaal sshd[6677]: Failed password for invalid user tavera from 77.237.77.207 port 48534 ssh2 Dec 19 00:59:07 markkoudstaal sshd[7267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.237.77.207 |
2019-12-19 08:16:39 |
| 51.79.44.52 | attackbots | SSH-BruteForce |
2019-12-19 08:39:45 |
| 191.34.74.55 | attackbots | Dec 19 00:59:59 ns381471 sshd[8661]: Failed password for root from 191.34.74.55 port 43278 ssh2 |
2019-12-19 08:21:48 |
| 85.37.38.195 | attack | Invalid user zitko from 85.37.38.195 port 14660 |
2019-12-19 08:16:11 |
| 139.59.38.94 | attack | Invalid user twister from 139.59.38.94 port 51812 |
2019-12-19 08:23:12 |
| 40.92.72.37 | attackbots | Dec 19 01:38:54 debian-2gb-vpn-nbg1-1 kernel: [1087097.398956] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.72.37 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=46276 DF PROTO=TCP SPT=22599 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-19 08:25:58 |
| 5.97.209.39 | attack | Dec 19 00:21:09 tux-35-217 sshd\[7359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.97.209.39 user=root Dec 19 00:21:11 tux-35-217 sshd\[7359\]: Failed password for root from 5.97.209.39 port 46138 ssh2 Dec 19 00:26:53 tux-35-217 sshd\[7425\]: Invalid user oracle from 5.97.209.39 port 58124 Dec 19 00:26:53 tux-35-217 sshd\[7425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.97.209.39 ... |
2019-12-19 08:18:05 |
| 185.156.73.42 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-12-19 08:35:48 |