城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.252.107.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;173.252.107.14. IN A
;; AUTHORITY SECTION:
. 43 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:15:44 CST 2022
;; MSG SIZE rcvd: 107
14.107.252.173.in-addr.arpa domain name pointer fwdproxy-rva-014.fbsv.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.107.252.173.in-addr.arpa name = fwdproxy-rva-014.fbsv.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.109.11.127 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-26 01:55:35 |
| 80.90.162.133 | attack | May 25 19:43:30 web01.agentur-b-2.de postfix/smtpd[290919]: NOQUEUE: reject: RCPT from mail.tantash.com[80.90.162.133]: 450 4.7.1 |
2020-05-26 02:09:06 |
| 45.172.212.246 | attack | May 25 18:09:37 h2646465 sshd[30232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.212.246 user=root May 25 18:09:39 h2646465 sshd[30232]: Failed password for root from 45.172.212.246 port 50376 ssh2 May 25 18:24:13 h2646465 sshd[32123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.212.246 user=root May 25 18:24:15 h2646465 sshd[32123]: Failed password for root from 45.172.212.246 port 44114 ssh2 May 25 18:28:51 h2646465 sshd[32724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.212.246 user=root May 25 18:28:53 h2646465 sshd[32724]: Failed password for root from 45.172.212.246 port 50196 ssh2 May 25 18:33:29 h2646465 sshd[947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.212.246 user=root May 25 18:33:31 h2646465 sshd[947]: Failed password for root from 45.172.212.246 port 56274 ssh2 May 25 18:38:04 h2646465 |
2020-05-26 02:25:49 |
| 85.209.0.100 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 22 proto: TCP cat: Misc Attack |
2020-05-26 02:22:39 |
| 51.68.229.73 | attack | May 25 18:04:47 sshgateway sshd\[17458\]: Invalid user named from 51.68.229.73 May 25 18:04:47 sshgateway sshd\[17458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-51-68-229.eu May 25 18:04:49 sshgateway sshd\[17458\]: Failed password for invalid user named from 51.68.229.73 port 55150 ssh2 |
2020-05-26 02:23:02 |
| 183.82.149.121 | attack | May 25 13:53:10 MainVPS sshd[15290]: Invalid user www from 183.82.149.121 port 55218 May 25 13:53:10 MainVPS sshd[15290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.149.121 May 25 13:53:10 MainVPS sshd[15290]: Invalid user www from 183.82.149.121 port 55218 May 25 13:53:12 MainVPS sshd[15290]: Failed password for invalid user www from 183.82.149.121 port 55218 ssh2 May 25 13:59:17 MainVPS sshd[19832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.149.121 user=backup May 25 13:59:19 MainVPS sshd[19832]: Failed password for backup from 183.82.149.121 port 54636 ssh2 ... |
2020-05-26 02:23:30 |
| 179.61.95.96 | attackspambots | May 25 13:10:14 mail.srvfarm.net postfix/smtpd[216668]: warning: unknown[179.61.95.96]: SASL PLAIN authentication failed: May 25 13:10:15 mail.srvfarm.net postfix/smtpd[216668]: lost connection after AUTH from unknown[179.61.95.96] May 25 13:11:09 mail.srvfarm.net postfix/smtps/smtpd[217864]: warning: unknown[179.61.95.96]: SASL PLAIN authentication failed: May 25 13:11:10 mail.srvfarm.net postfix/smtps/smtpd[217864]: lost connection after AUTH from unknown[179.61.95.96] May 25 13:15:34 mail.srvfarm.net postfix/smtps/smtpd[235736]: warning: unknown[179.61.95.96]: SASL PLAIN authentication failed: |
2020-05-26 02:04:20 |
| 183.89.212.139 | attackspambots | "IMAP brute force auth login attempt." |
2020-05-26 02:19:40 |
| 45.76.176.129 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-05-26 02:17:49 |
| 45.5.238.183 | attack | May 25 13:42:00 mail.srvfarm.net postfix/smtpd[235746]: warning: 45-5-238-183.jerenet.com.br[45.5.238.183]: SASL PLAIN authentication failed: May 25 13:42:01 mail.srvfarm.net postfix/smtpd[235746]: lost connection after AUTH from 45-5-238-183.jerenet.com.br[45.5.238.183] May 25 13:44:46 mail.srvfarm.net postfix/smtps/smtpd[240130]: warning: 45-5-238-183.jerenet.com.br[45.5.238.183]: SASL PLAIN authentication failed: May 25 13:44:47 mail.srvfarm.net postfix/smtps/smtpd[240130]: lost connection after AUTH from 45-5-238-183.jerenet.com.br[45.5.238.183] May 25 13:44:55 mail.srvfarm.net postfix/smtps/smtpd[244218]: warning: 45-5-238-183.jerenet.com.br[45.5.238.183]: SASL PLAIN authentication failed: |
2020-05-26 02:13:34 |
| 36.233.120.95 | attack | Automatic report - Port Scan Attack |
2020-05-26 01:51:35 |
| 66.249.65.210 | attackspam | [Mon May 25 18:59:30.867347 2020] [:error] [pid 20362:tid 139717567837952] [client 66.249.65.210:64347] [client 66.249.65.210] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/component/tags/tag/655-kalender-tanam-provinsi-jawa-timur"] [unique_id "XsuzIZF2BN7fidk-iLyMyAAAAfE"]
... |
2020-05-26 02:18:51 |
| 141.98.80.46 | attackspambots | May 25 21:01:16 takio postfix/smtpd[16388]: lost connection after AUTH from unknown[141.98.80.46] May 25 21:01:22 takio postfix/smtpd[16388]: lost connection after AUTH from unknown[141.98.80.46] May 25 21:01:29 takio postfix/smtpd[16387]: lost connection after AUTH from unknown[141.98.80.46] |
2020-05-26 02:05:08 |
| 106.12.196.118 | attackbotsspam | May 25 15:58:55 santamaria sshd\[12156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.196.118 user=root May 25 15:58:57 santamaria sshd\[12156\]: Failed password for root from 106.12.196.118 port 60760 ssh2 May 25 16:04:15 santamaria sshd\[12220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.196.118 user=root ... |
2020-05-26 02:20:47 |
| 37.139.20.6 | attackbots | May 25 17:28:34 ArkNodeAT sshd\[25799\]: Invalid user victoria from 37.139.20.6 May 25 17:28:34 ArkNodeAT sshd\[25799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.20.6 May 25 17:28:35 ArkNodeAT sshd\[25799\]: Failed password for invalid user victoria from 37.139.20.6 port 49848 ssh2 |
2020-05-26 01:47:41 |