城市(city): Taipei
省份(region): Taipei City
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.116.67.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.116.67.219. IN A
;; AUTHORITY SECTION:
. 433 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022042300 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 24 00:05:38 CST 2022
;; MSG SIZE rcvd: 107
219.67.116.150.in-addr.arpa domain name pointer 219-67-116-150-static.chief.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
219.67.116.150.in-addr.arpa name = 219-67-116-150-static.chief.net.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.229.50.25 | attackbots | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-21 05:33:13 |
| 43.251.37.21 | attack | frenzy |
2020-07-21 05:39:27 |
| 160.153.154.31 | attackbots | C2,WP GET /v1/wp-includes/wlwmanifest.xml |
2020-07-21 05:38:25 |
| 1.209.110.88 | attack | Invalid user casa from 1.209.110.88 port 35952 |
2020-07-21 05:23:11 |
| 114.98.126.14 | attackspam | Jul 20 23:26:24 piServer sshd[6152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.126.14 Jul 20 23:26:27 piServer sshd[6152]: Failed password for invalid user zsh from 114.98.126.14 port 35062 ssh2 Jul 20 23:30:25 piServer sshd[7015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.126.14 ... |
2020-07-21 05:42:24 |
| 161.35.230.229 | attack | Jul 20 23:39:33 journals sshd\[56912\]: Invalid user hxx from 161.35.230.229 Jul 20 23:39:33 journals sshd\[56912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.230.229 Jul 20 23:39:35 journals sshd\[56912\]: Failed password for invalid user hxx from 161.35.230.229 port 49030 ssh2 Jul 20 23:44:01 journals sshd\[57475\]: Invalid user xuyuanchao from 161.35.230.229 Jul 20 23:44:01 journals sshd\[57475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.230.229 ... |
2020-07-21 05:08:50 |
| 46.38.150.191 | attackspambots | Jul 20 23:29:56 srv01 postfix/smtpd\[333\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 20 23:30:14 srv01 postfix/smtpd\[32713\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 20 23:30:24 srv01 postfix/smtpd\[333\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 20 23:30:29 srv01 postfix/smtpd\[393\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 20 23:30:46 srv01 postfix/smtpd\[333\]: warning: unknown\[46.38.150.191\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-21 05:30:51 |
| 222.186.169.194 | attack | Jul 20 23:23:48 pve1 sshd[12362]: Failed password for root from 222.186.169.194 port 36418 ssh2 Jul 20 23:23:52 pve1 sshd[12362]: Failed password for root from 222.186.169.194 port 36418 ssh2 ... |
2020-07-21 05:25:08 |
| 128.199.240.120 | attackspambots | Jul 20 21:10:27 rush sshd[5571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120 Jul 20 21:10:29 rush sshd[5571]: Failed password for invalid user e from 128.199.240.120 port 56280 ssh2 Jul 20 21:15:14 rush sshd[5728]: Failed password for www-data from 128.199.240.120 port 42780 ssh2 ... |
2020-07-21 05:20:23 |
| 112.169.9.160 | attackbots | Jul 20 23:30:53 eventyay sshd[16480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.9.160 Jul 20 23:30:55 eventyay sshd[16480]: Failed password for invalid user hadoop from 112.169.9.160 port 36708 ssh2 Jul 20 23:32:27 eventyay sshd[16495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.9.160 ... |
2020-07-21 05:34:15 |
| 14.156.200.93 | attackbots | Jul 20 21:30:30 rush sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.156.200.93 Jul 20 21:30:32 rush sshd[6260]: Failed password for invalid user master from 14.156.200.93 port 25204 ssh2 Jul 20 21:35:00 rush sshd[6411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.156.200.93 ... |
2020-07-21 05:35:57 |
| 82.221.131.5 | attackbots | 20 attempts against mh-misbehave-ban on comet |
2020-07-21 05:30:22 |
| 115.236.167.108 | attack | Invalid user zhangkai from 115.236.167.108 port 37292 |
2020-07-21 05:42:04 |
| 83.97.20.35 | attack | Persistent intruder & port scanner - 83.97.20.35 |
2020-07-21 05:15:12 |
| 45.32.217.124 | attackspambots | Port Scan detected! ... |
2020-07-21 05:40:56 |