城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.254.14.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.254.14.20. IN A
;; AUTHORITY SECTION:
. 238 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400
;; Query time: 151 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 15:15:50 CST 2023
;; MSG SIZE rcvd: 105
Host 20.14.254.16.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.14.254.16.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 125.64.94.212 | attackspambots | Port scan: Attack repeated for 24 hours |
2019-11-14 14:48:56 |
| 212.232.34.206 | attackspambots | 23/tcp [2019-11-14]1pkt |
2019-11-14 14:29:19 |
| 188.17.108.47 | attack | Chat Spam |
2019-11-14 14:11:19 |
| 190.167.103.72 | attack | 81/tcp [2019-11-14]1pkt |
2019-11-14 14:22:47 |
| 221.178.192.198 | attackspam | 11/14/2019-01:30:39.185215 221.178.192.198 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-14 14:46:36 |
| 93.185.111.66 | attackspambots | Nov 14 07:27:07 lnxweb61 sshd[30287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.185.111.66 Nov 14 07:27:09 lnxweb61 sshd[30287]: Failed password for invalid user shukster from 93.185.111.66 port 50347 ssh2 Nov 14 07:30:41 lnxweb61 sshd[1829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.185.111.66 |
2019-11-14 15:01:17 |
| 203.129.207.4 | attack | Invalid user test from 203.129.207.4 port 42586 |
2019-11-14 14:19:36 |
| 77.42.76.191 | attackspambots | 37215/tcp [2019-11-14]1pkt |
2019-11-14 14:20:08 |
| 106.13.203.62 | attack | Nov 14 06:57:18 vmanager6029 sshd\[11959\]: Invalid user 1234 from 106.13.203.62 port 60150 Nov 14 06:57:18 vmanager6029 sshd\[11959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.62 Nov 14 06:57:19 vmanager6029 sshd\[11959\]: Failed password for invalid user 1234 from 106.13.203.62 port 60150 ssh2 |
2019-11-14 14:29:48 |
| 153.99.134.128 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/153.99.134.128/ CN - 1H : (736) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4837 IP : 153.99.134.128 CIDR : 153.99.0.0/16 PREFIX COUNT : 1262 UNIQUE IP COUNT : 56665856 ATTACKS DETECTED ASN4837 : 1H - 21 3H - 55 6H - 116 12H - 248 24H - 304 DateTime : 2019-11-14 05:55:31 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-14 14:10:26 |
| 114.34.112.174 | attack | Telnet Server BruteForce Attack |
2019-11-14 15:00:27 |
| 114.118.91.64 | attack | Nov 14 07:26:19 v22019058497090703 sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.64 Nov 14 07:26:21 v22019058497090703 sshd[27933]: Failed password for invalid user kevin from 114.118.91.64 port 44506 ssh2 Nov 14 07:30:56 v22019058497090703 sshd[28252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.64 ... |
2019-11-14 14:43:12 |
| 125.27.12.20 | attackspam | Nov 13 20:26:28 hpm sshd\[7562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.27.12.20 user=root Nov 13 20:26:30 hpm sshd\[7562\]: Failed password for root from 125.27.12.20 port 53762 ssh2 Nov 13 20:30:46 hpm sshd\[7897\]: Invalid user bot2 from 125.27.12.20 Nov 13 20:30:46 hpm sshd\[7897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.27.12.20 Nov 13 20:30:49 hpm sshd\[7897\]: Failed password for invalid user bot2 from 125.27.12.20 port 59052 ssh2 |
2019-11-14 14:49:22 |
| 66.42.112.81 | attackbotsspam | Wordpress bruteforce |
2019-11-14 14:43:58 |
| 49.234.189.19 | attack | Nov 14 07:25:50 legacy sshd[13963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.189.19 Nov 14 07:25:53 legacy sshd[13963]: Failed password for invalid user transeur from 49.234.189.19 port 53578 ssh2 Nov 14 07:30:43 legacy sshd[14075]: Failed password for sshd from 49.234.189.19 port 55796 ssh2 ... |
2019-11-14 14:51:50 |