城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.214.145.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.214.145.108. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:50:51 CST 2025
;; MSG SIZE rcvd: 106
108.145.214.2.in-addr.arpa domain name pointer dynamic-002-214-145-108.2.214.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
108.145.214.2.in-addr.arpa name = dynamic-002-214-145-108.2.214.pool.telefonica.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 81.22.45.133 | attackspambots | firewall-block, port(s): 33390/tcp, 33399/tcp |
2019-10-18 05:25:47 |
| 89.248.162.167 | attack | 10/17/2019-15:51:30.268848 89.248.162.167 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98 |
2019-10-18 05:52:45 |
| 201.174.46.234 | attack | Invalid user nagios from 201.174.46.234 port 21479 |
2019-10-18 05:40:39 |
| 201.216.193.65 | attackspambots | Jun 13 10:00:55 odroid64 sshd\[26988\]: Invalid user java from 201.216.193.65 Jun 13 10:00:55 odroid64 sshd\[26988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.193.65 Jun 13 10:00:57 odroid64 sshd\[26988\]: Failed password for invalid user java from 201.216.193.65 port 45375 ssh2 ... |
2019-10-18 05:49:20 |
| 106.52.34.27 | attackbotsspam | 2019-10-17T21:31:12.889565abusebot-5.cloudsearch.cf sshd\[10063\]: Invalid user 123456 from 106.52.34.27 port 51018 |
2019-10-18 05:55:58 |
| 123.207.79.126 | attack | 2019-10-17T22:12:45.356918 sshd[8610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.79.126 user=root 2019-10-17T22:12:47.679292 sshd[8610]: Failed password for root from 123.207.79.126 port 37892 ssh2 2019-10-17T22:23:35.044513 sshd[8761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.79.126 user=root 2019-10-17T22:23:37.266838 sshd[8761]: Failed password for root from 123.207.79.126 port 37658 ssh2 2019-10-17T22:27:47.569218 sshd[8809]: Invalid user user from 123.207.79.126 port 47410 ... |
2019-10-18 05:29:18 |
| 201.219.186.243 | attackspam | Apr 18 03:12:37 odroid64 sshd\[29004\]: Invalid user iconn from 201.219.186.243 Apr 18 03:12:37 odroid64 sshd\[29004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.186.243 Apr 18 03:12:39 odroid64 sshd\[29004\]: Failed password for invalid user iconn from 201.219.186.243 port 51629 ssh2 Apr 19 15:32:58 odroid64 sshd\[13938\]: Invalid user Admin from 201.219.186.243 Apr 19 15:32:58 odroid64 sshd\[13938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.186.243 Apr 19 15:33:00 odroid64 sshd\[13938\]: Failed password for invalid user Admin from 201.219.186.243 port 51517 ssh2 ... |
2019-10-18 05:39:35 |
| 114.67.89.11 | attackbotsspam | Oct 17 21:14:56 hcbbdb sshd\[16940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.89.11 user=root Oct 17 21:14:58 hcbbdb sshd\[16940\]: Failed password for root from 114.67.89.11 port 50278 ssh2 Oct 17 21:18:49 hcbbdb sshd\[17331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.89.11 user=root Oct 17 21:18:51 hcbbdb sshd\[17331\]: Failed password for root from 114.67.89.11 port 59990 ssh2 Oct 17 21:22:49 hcbbdb sshd\[17809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.89.11 user=root |
2019-10-18 05:32:25 |
| 217.182.196.178 | attackspam | Oct 17 13:30:15 xb0 sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.196.178 user=r.r Oct 17 13:30:17 xb0 sshd[2127]: Failed password for r.r from 217.182.196.178 port 60824 ssh2 Oct 17 13:30:17 xb0 sshd[2127]: Received disconnect from 217.182.196.178: 11: Bye Bye [preauth] Oct 17 13:39:29 xb0 sshd[18915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.196.178 user=r.r Oct 17 13:39:31 xb0 sshd[18915]: Failed password for r.r from 217.182.196.178 port 60942 ssh2 Oct 17 13:39:31 xb0 sshd[18915]: Received disconnect from 217.182.196.178: 11: Bye Bye [preauth] Oct 17 13:43:05 xb0 sshd[17109]: Failed password for invalid user virusalert from 217.182.196.178 port 45104 ssh2 Oct 17 13:43:05 xb0 sshd[17109]: Received disconnect from 217.182.196.178: 11: Bye Bye [preauth] Oct 17 13:46:36 xb0 sshd[14183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........ ------------------------------- |
2019-10-18 05:35:25 |
| 140.143.66.239 | attack | Oct 17 21:03:43 ip-172-31-62-245 sshd\[8156\]: Invalid user vegas from 140.143.66.239\ Oct 17 21:03:45 ip-172-31-62-245 sshd\[8156\]: Failed password for invalid user vegas from 140.143.66.239 port 40842 ssh2\ Oct 17 21:07:47 ip-172-31-62-245 sshd\[8176\]: Failed password for sshd from 140.143.66.239 port 50084 ssh2\ Oct 17 21:11:44 ip-172-31-62-245 sshd\[8292\]: Invalid user oneadmin from 140.143.66.239\ Oct 17 21:11:46 ip-172-31-62-245 sshd\[8292\]: Failed password for invalid user oneadmin from 140.143.66.239 port 59316 ssh2\ |
2019-10-18 05:47:06 |
| 87.98.238.106 | attack | Invalid user rator from 87.98.238.106 port 36346 |
2019-10-18 05:49:05 |
| 201.217.54.211 | attackspam | Jun 24 09:43:28 odroid64 sshd\[32511\]: Invalid user ankesh from 201.217.54.211 Jun 24 09:43:28 odroid64 sshd\[32511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.54.211 Jun 24 09:43:30 odroid64 sshd\[32511\]: Failed password for invalid user ankesh from 201.217.54.211 port 14988 ssh2 Jun 24 09:43:28 odroid64 sshd\[32511\]: Invalid user ankesh from 201.217.54.211 Jun 24 09:43:28 odroid64 sshd\[32511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.54.211 Jun 24 09:43:30 odroid64 sshd\[32511\]: Failed password for invalid user ankesh from 201.217.54.211 port 14988 ssh2 Nov 9 15:55:23 odroid64 sshd\[12335\]: Invalid user student from 201.217.54.211 Nov 9 15:55:23 odroid64 sshd\[12335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.54.211 Nov 9 15:55:25 odroid64 sshd\[12335\]: Failed password for invalid user student from 201 ... |
2019-10-18 05:41:41 |
| 201.214.29.112 | attackbots | May 8 05:32:21 odroid64 sshd\[11666\]: Invalid user pi from 201.214.29.112 May 8 05:32:21 odroid64 sshd\[11666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.214.29.112 May 8 05:32:22 odroid64 sshd\[11668\]: Invalid user pi from 201.214.29.112 May 8 05:32:23 odroid64 sshd\[11668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.214.29.112 May 8 05:32:23 odroid64 sshd\[11666\]: Failed password for invalid user pi from 201.214.29.112 port 52294 ssh2 May 8 05:32:24 odroid64 sshd\[11668\]: Failed password for invalid user pi from 201.214.29.112 port 52300 ssh2 Jun 1 21:30:16 odroid64 sshd\[31068\]: Invalid user pi from 201.214.29.112 Jun 1 21:30:16 odroid64 sshd\[31070\]: Invalid user pi from 201.214.29.112 Jun 1 21:30:16 odroid64 sshd\[31068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.214.29.112 Jun 1 21:30:16 odroid64 sshd\[310 ... |
2019-10-18 05:52:10 |
| 201.215.32.35 | attack | Jan 27 19:20:32 odroid64 sshd\[27854\]: Invalid user ts3 from 201.215.32.35 Jan 27 19:20:32 odroid64 sshd\[27854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.215.32.35 Jan 27 19:20:33 odroid64 sshd\[27854\]: Failed password for invalid user ts3 from 201.215.32.35 port 45974 ssh2 ... |
2019-10-18 05:49:47 |
| 180.121.82.41 | attack | (Oct 18) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=26165 TCP DPT=8080 WINDOW=60650 SYN (Oct 17) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=22138 TCP DPT=8080 WINDOW=5907 SYN (Oct 17) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=19275 TCP DPT=8080 WINDOW=60650 SYN (Oct 16) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=7643 TCP DPT=8080 WINDOW=60650 SYN (Oct 16) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=42474 TCP DPT=8080 WINDOW=5907 SYN (Oct 15) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=22129 TCP DPT=8080 WINDOW=5907 SYN (Oct 15) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=16875 TCP DPT=8080 WINDOW=5907 SYN (Oct 15) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=21660 TCP DPT=8080 WINDOW=5907 SYN (Oct 14) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=31596 TCP DPT=8080 WINDOW=60650 SYN |
2019-10-18 06:01:26 |