城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.12.244.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.12.244.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 13:30:54 CST 2025
;; MSG SIZE rcvd: 107
Host 214.244.12.158.in-addr.arpa not found: 2(SERVFAIL)
server can't find 158.12.244.214.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 121.236.31.226 | attackbotsspam | Icarus honeypot on github |
2020-08-31 12:57:01 |
| 176.122.156.32 | attackbots | Aug 31 05:57:48 h2829583 sshd[30664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.156.32 |
2020-08-31 13:27:20 |
| 202.59.161.122 | attackbotsspam | 20/8/30@23:58:15: FAIL: Alarm-Network address from=202.59.161.122 20/8/30@23:58:16: FAIL: Alarm-Network address from=202.59.161.122 ... |
2020-08-31 13:08:20 |
| 185.234.219.85 | attackbots |
|
2020-08-31 13:15:22 |
| 159.89.88.119 | attackspambots | 2020-08-31T07:58:44.747865mail.standpoint.com.ua sshd[18559]: Failed password for invalid user odoo from 159.89.88.119 port 50908 ssh2 2020-08-31T08:02:13.371328mail.standpoint.com.ua sshd[19027]: Invalid user pokus from 159.89.88.119 port 56616 2020-08-31T08:02:13.373967mail.standpoint.com.ua sshd[19027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.88.119 2020-08-31T08:02:13.371328mail.standpoint.com.ua sshd[19027]: Invalid user pokus from 159.89.88.119 port 56616 2020-08-31T08:02:15.656790mail.standpoint.com.ua sshd[19027]: Failed password for invalid user pokus from 159.89.88.119 port 56616 ssh2 ... |
2020-08-31 13:10:19 |
| 189.91.4.240 | attack | (smtpauth) Failed SMTP AUTH login from 189.91.4.240 (BR/Brazil/189-91-4-240.dvl-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-31 08:28:18 plain authenticator failed for ([189.91.4.240]) [189.91.4.240]: 535 Incorrect authentication data (set_id=fd2302) |
2020-08-31 13:01:47 |
| 192.35.168.235 | attackspambots | 9055/tcp 9533/tcp 3384/tcp... [2020-06-30/08-31]303pkt,263pt.(tcp) |
2020-08-31 13:25:15 |
| 149.202.175.11 | attackspam | 2020-08-31T06:54:30.474501lavrinenko.info sshd[9361]: Invalid user rud from 149.202.175.11 port 58462 2020-08-31T06:54:30.480909lavrinenko.info sshd[9361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.175.11 2020-08-31T06:54:30.474501lavrinenko.info sshd[9361]: Invalid user rud from 149.202.175.11 port 58462 2020-08-31T06:54:32.649344lavrinenko.info sshd[9361]: Failed password for invalid user rud from 149.202.175.11 port 58462 ssh2 2020-08-31T06:58:18.554582lavrinenko.info sshd[9607]: Invalid user yiyuan from 149.202.175.11 port 36834 ... |
2020-08-31 13:03:20 |
| 27.72.97.58 | attackbots | Brute forcing RDP port 3389 |
2020-08-31 13:18:06 |
| 222.186.180.130 | attackspambots | Aug 31 07:15:32 dev0-dcde-rnet sshd[24037]: Failed password for root from 222.186.180.130 port 27639 ssh2 Aug 31 07:15:42 dev0-dcde-rnet sshd[24039]: Failed password for root from 222.186.180.130 port 42122 ssh2 |
2020-08-31 13:16:46 |
| 185.244.214.199 | attackbotsspam | Attempted Brute Force (dovecot) |
2020-08-31 12:52:52 |
| 174.138.48.152 | attackspam | Aug 31 06:21:26 ajax sshd[9851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.48.152 Aug 31 06:21:28 ajax sshd[9851]: Failed password for invalid user qwt from 174.138.48.152 port 38034 ssh2 |
2020-08-31 13:22:30 |
| 103.28.38.166 | attackspam | 2020-08-30 21:38 Unauthorized connection attempt to IMAP/POP |
2020-08-31 13:28:59 |
| 116.72.194.67 | attackbots | *Port Scan* detected from 116.72.194.67 (IN/India/-). 4 hits in the last 191 seconds |
2020-08-31 12:58:40 |
| 117.247.238.10 | attackspam | Aug 30 21:10:22 pixelmemory sshd[2580963]: Invalid user al from 117.247.238.10 port 36820 Aug 30 21:10:22 pixelmemory sshd[2580963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.247.238.10 Aug 30 21:10:22 pixelmemory sshd[2580963]: Invalid user al from 117.247.238.10 port 36820 Aug 30 21:10:24 pixelmemory sshd[2580963]: Failed password for invalid user al from 117.247.238.10 port 36820 ssh2 Aug 30 21:15:38 pixelmemory sshd[2581593]: Invalid user steam from 117.247.238.10 port 57484 ... |
2020-08-31 13:31:53 |