城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.214.144.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23611
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.214.144.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:48:10 CST 2025
;; MSG SIZE rcvd: 107
Host 13.144.214.161.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.144.214.161.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.168.151.39 | attackbots | 2019-12-02T07:32:41.391281abusebot-3.cloudsearch.cf sshd\[26472\]: Invalid user longhua_123456 from 104.168.151.39 port 35480 |
2019-12-02 15:39:08 |
| 147.0.220.29 | attack | SSH invalid-user multiple login try |
2019-12-02 15:27:15 |
| 181.225.103.114 | attack | SpamReport |
2019-12-02 15:07:03 |
| 23.247.33.61 | attackbotsspam | Dec 2 07:34:29 Ubuntu-1404-trusty-64-minimal sshd\[29698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61 user=sync Dec 2 07:34:30 Ubuntu-1404-trusty-64-minimal sshd\[29698\]: Failed password for sync from 23.247.33.61 port 35804 ssh2 Dec 2 07:44:36 Ubuntu-1404-trusty-64-minimal sshd\[6481\]: Invalid user info from 23.247.33.61 Dec 2 07:44:36 Ubuntu-1404-trusty-64-minimal sshd\[6481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61 Dec 2 07:44:38 Ubuntu-1404-trusty-64-minimal sshd\[6481\]: Failed password for invalid user info from 23.247.33.61 port 59888 ssh2 |
2019-12-02 15:21:34 |
| 175.143.127.73 | attack | Invalid user steve from 175.143.127.73 port 35784 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.127.73 Failed password for invalid user steve from 175.143.127.73 port 35784 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.127.73 user=root Failed password for root from 175.143.127.73 port 41254 ssh2 |
2019-12-02 15:07:30 |
| 125.161.128.78 | attackspam | Dec 2 07:53:05 cvbnet sshd[23535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.128.78 Dec 2 07:53:06 cvbnet sshd[23535]: Failed password for invalid user dietpi from 125.161.128.78 port 39511 ssh2 ... |
2019-12-02 15:12:40 |
| 45.93.20.191 | attackbots | firewall-block, port(s): 1181/tcp |
2019-12-02 15:28:45 |
| 94.177.214.200 | attackbotsspam | Dec 1 21:30:29 eddieflores sshd\[32672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200 user=root Dec 1 21:30:30 eddieflores sshd\[32672\]: Failed password for root from 94.177.214.200 port 53152 ssh2 Dec 1 21:36:07 eddieflores sshd\[762\]: Invalid user visitante from 94.177.214.200 Dec 1 21:36:07 eddieflores sshd\[762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200 Dec 1 21:36:09 eddieflores sshd\[762\]: Failed password for invalid user visitante from 94.177.214.200 port 37294 ssh2 |
2019-12-02 15:40:57 |
| 123.7.178.136 | attackspambots | SSHD brute force attack detected by fail2ban |
2019-12-02 15:34:54 |
| 203.202.240.189 | attackbotsspam | Honeypot attack, port: 445, PTR: expo13.rad1.aamranetworks.com. |
2019-12-02 15:32:29 |
| 218.92.0.189 | attackspam | 12/02/2019-01:29:36.291216 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan |
2019-12-02 15:34:31 |
| 112.133.232.84 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-02 15:30:07 |
| 113.88.14.2 | attack | firewall-block, port(s): 1433/tcp |
2019-12-02 15:28:03 |
| 90.187.62.121 | attackbots | Dec 2 14:03:22 webhost01 sshd[32534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.187.62.121 Dec 2 14:03:24 webhost01 sshd[32534]: Failed password for invalid user gamaleldin from 90.187.62.121 port 44294 ssh2 ... |
2019-12-02 15:16:53 |
| 117.50.98.207 | attack | Dec 2 08:00:19 vps647732 sshd[14856]: Failed password for root from 117.50.98.207 port 50414 ssh2 Dec 2 08:08:03 vps647732 sshd[15101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.98.207 ... |
2019-12-02 15:14:14 |