城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.163.199.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.163.199.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:24:33 CST 2025
;; MSG SIZE rcvd: 108
Host 214.199.163.195.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.199.163.195.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 172.69.63.139 | attackspam | srv02 DDoS Malware Target(80:http) .. |
2020-10-08 05:22:41 |
| 157.55.39.175 | attackspam | Automatic report - Banned IP Access |
2020-10-08 05:34:28 |
| 49.247.21.43 | attackspambots | failed root login |
2020-10-08 05:03:26 |
| 128.14.133.58 | attack | Tried to find non-existing directory/file on the server |
2020-10-08 05:09:27 |
| 2a01:4f8:c2c:97c1::1 | attack | [WedOct0723:12:05.7271442020][:error][pid23678:tid47724261132032][client2a01:4f8:c2c:97c1::1:42670][client2a01:4f8:c2c:97c1::1]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"www.nonsolotende.ch"][uri"/wp-content/plugins/wp-file-manager/readme.txt"][unique_id"X34vJV817Y3M8cNF2tz2rwAAAI4"][WedOct0723:12:06.8456712020][:error][pid23678:tid47724261132032][client2a01:4f8:c2c:97c1::1:42670][client2a01:4f8:c2c:97c1::1]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disableth |
2020-10-08 05:29:44 |
| 159.203.66.114 | attackbotsspam | 2020-10-07T16:27:54.4652451495-001 sshd[18447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.114 user=root 2020-10-07T16:27:56.1837661495-001 sshd[18447]: Failed password for root from 159.203.66.114 port 50780 ssh2 2020-10-07T16:31:40.4583251495-001 sshd[18668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.114 user=root 2020-10-07T16:31:42.2072881495-001 sshd[18668]: Failed password for root from 159.203.66.114 port 56236 ssh2 2020-10-07T16:35:31.5633731495-001 sshd[18854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.114 user=root 2020-10-07T16:35:33.3575381495-001 sshd[18854]: Failed password for root from 159.203.66.114 port 33462 ssh2 ... |
2020-10-08 05:39:03 |
| 111.207.167.147 | attackbots | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(10061547) |
2020-10-08 05:10:26 |
| 139.59.228.154 | attackspambots | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-10-08 05:13:06 |
| 185.244.39.159 | attackbots | Oct 7 21:50:38 * sshd[24162]: Failed password for root from 185.244.39.159 port 50980 ssh2 |
2020-10-08 05:01:58 |
| 36.91.38.31 | attackspam | Triggered by Fail2Ban at Ares web server |
2020-10-08 05:02:42 |
| 188.166.23.215 | attackbotsspam | Oct 7 21:19:30 marvibiene sshd[27429]: Failed password for root from 188.166.23.215 port 37932 ssh2 Oct 7 21:28:57 marvibiene sshd[27965]: Failed password for root from 188.166.23.215 port 44178 ssh2 |
2020-10-08 05:24:21 |
| 200.146.196.100 | attackbots | Oct 6 06:21:07 lola sshd[10274]: reveeclipse mapping checking getaddrinfo for 200-146-196-100.static.ctbctelecom.com.br [200.146.196.100] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 6 06:21:07 lola sshd[10274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.196.100 user=r.r Oct 6 06:21:09 lola sshd[10274]: Failed password for r.r from 200.146.196.100 port 35336 ssh2 Oct 6 06:21:09 lola sshd[10274]: Received disconnect from 200.146.196.100: 11: Bye Bye [preauth] Oct 6 06:24:43 lola sshd[10351]: reveeclipse mapping checking getaddrinfo for 200-146-196-100.static.ctbctelecom.com.br [200.146.196.100] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 6 06:24:43 lola sshd[10351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.196.100 user=r.r Oct 6 06:24:45 lola sshd[10351]: Failed password for r.r from 200.146.196.100 port 53922 ssh2 Oct 6 06:24:45 lola sshd[10351]: Received disconn........ ------------------------------- |
2020-10-08 05:36:55 |
| 107.170.20.247 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-08 05:18:18 |
| 187.107.68.86 | attack | SSH Brute-Forcing (server1) |
2020-10-08 05:14:20 |
| 192.99.55.242 | attackspambots | Oct 7 17:42:26 vpn01 sshd[23695]: Failed password for root from 192.99.55.242 port 37834 ssh2 ... |
2020-10-08 05:13:32 |