城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.209.141.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.209.141.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:01:35 CST 2025
;; MSG SIZE rcvd: 107
Host 14.141.209.150.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.141.209.150.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
222.186.30.145 | attackbotsspam | 2020-02-12T09:38:23.033356scmdmz1 sshd[20900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root 2020-02-12T09:38:24.947837scmdmz1 sshd[20900]: Failed password for root from 222.186.30.145 port 11121 ssh2 2020-02-12T09:38:27.380711scmdmz1 sshd[20900]: Failed password for root from 222.186.30.145 port 11121 ssh2 2020-02-12T09:38:23.033356scmdmz1 sshd[20900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root 2020-02-12T09:38:24.947837scmdmz1 sshd[20900]: Failed password for root from 222.186.30.145 port 11121 ssh2 2020-02-12T09:38:27.380711scmdmz1 sshd[20900]: Failed password for root from 222.186.30.145 port 11121 ssh2 2020-02-12T09:38:23.033356scmdmz1 sshd[20900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root 2020-02-12T09:38:24.947837scmdmz1 sshd[20900]: Failed password for root from 222.186.30.145 port 11121 ssh2 2 |
2020-02-12 16:53:28 |
112.85.42.174 | attackspam | Feb 12 04:14:40 plusreed sshd[5910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Feb 12 04:14:42 plusreed sshd[5910]: Failed password for root from 112.85.42.174 port 50545 ssh2 ... |
2020-02-12 17:16:08 |
181.191.95.2 | attack | Telnetd brute force attack detected by fail2ban |
2020-02-12 17:08:12 |
51.38.188.101 | attack | Feb 12 08:23:56 pornomens sshd\[4174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.101 user=root Feb 12 08:23:58 pornomens sshd\[4174\]: Failed password for root from 51.38.188.101 port 41544 ssh2 Feb 12 08:27:08 pornomens sshd\[4210\]: Invalid user idaliaems from 51.38.188.101 port 43058 Feb 12 08:27:08 pornomens sshd\[4210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.101 ... |
2020-02-12 17:24:35 |
81.218.168.85 | attackbots | Automatic report - Port Scan Attack |
2020-02-12 17:17:11 |
178.62.203.226 | attackspambots | Feb 12 07:11:32 legacy sshd[8272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.203.226 Feb 12 07:11:34 legacy sshd[8272]: Failed password for invalid user waldo from 178.62.203.226 port 34096 ssh2 Feb 12 07:14:51 legacy sshd[8511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.203.226 ... |
2020-02-12 17:21:20 |
149.56.19.4 | attackbots | Automatic report - XMLRPC Attack |
2020-02-12 17:04:55 |
14.29.144.26 | attackspam | Feb 12 05:53:22 pornomens sshd\[2470\]: Invalid user test from 14.29.144.26 port 51672 Feb 12 05:53:22 pornomens sshd\[2470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.144.26 Feb 12 05:53:23 pornomens sshd\[2470\]: Failed password for invalid user test from 14.29.144.26 port 51672 ssh2 ... |
2020-02-12 17:22:45 |
203.110.166.51 | attackbotsspam | Feb 12 09:33:56 MK-Soft-Root2 sshd[3781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.166.51 Feb 12 09:33:58 MK-Soft-Root2 sshd[3781]: Failed password for invalid user pubsub1 from 203.110.166.51 port 25611 ssh2 ... |
2020-02-12 17:01:13 |
109.227.63.3 | attackspambots | Feb 12 09:42:07 legacy sshd[17199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 Feb 12 09:42:09 legacy sshd[17199]: Failed password for invalid user goncharova from 109.227.63.3 port 57181 ssh2 Feb 12 09:45:18 legacy sshd[17333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 ... |
2020-02-12 16:59:16 |
5.196.140.219 | attackbots | Feb 12 06:14:39 ns382633 sshd\[15826\]: Invalid user ubuntu from 5.196.140.219 port 41329 Feb 12 06:14:39 ns382633 sshd\[15826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.140.219 Feb 12 06:14:40 ns382633 sshd\[15826\]: Failed password for invalid user ubuntu from 5.196.140.219 port 41329 ssh2 Feb 12 06:17:10 ns382633 sshd\[16514\]: Invalid user rockwell from 5.196.140.219 port 56641 Feb 12 06:17:10 ns382633 sshd\[16514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.140.219 |
2020-02-12 17:18:35 |
36.71.238.209 | attack | 1581483239 - 02/12/2020 05:53:59 Host: 36.71.238.209/36.71.238.209 Port: 445 TCP Blocked |
2020-02-12 16:56:46 |
187.204.49.61 | attackbotsspam | Fail2Ban Ban Triggered |
2020-02-12 17:15:04 |
106.12.188.252 | attack | sshd jail - ssh hack attempt |
2020-02-12 17:12:50 |
58.211.240.42 | attackspam | Unauthorized connection attempt from IP address 58.211.240.42 on Port 139(NETBIOS) |
2020-02-12 17:08:28 |