城市(city): Santiago de Cali
省份(region): Departamento del Valle del Cauca
国家(country): Colombia
运营商(isp): Emcali - Rangos Fijos PPPoE
主机名(hostname): unknown
机构(organization): EMPRESAS MUNICIPALES DE CALI E.I.C.E. E.S.P.
使用类型(Usage Type): unknown
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack | Unauthorized connection attempt detected from IP address 200.29.108.214 to port 2220 [J] |
2020-01-26 06:49:29 |
| attackspam | Unauthorized connection attempt detected from IP address 200.29.108.214 to port 2220 [J] |
2020-01-14 20:34:52 |
| attackspam | Jan 2 01:39:12 server sshd\[11921\]: Invalid user zbigniew from 200.29.108.214 Jan 2 01:39:12 server sshd\[11921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co Jan 2 01:39:14 server sshd\[11921\]: Failed password for invalid user zbigniew from 200.29.108.214 port 46753 ssh2 Jan 2 01:51:41 server sshd\[14597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co user=operator Jan 2 01:51:43 server sshd\[14597\]: Failed password for operator from 200.29.108.214 port 25633 ssh2 ... |
2020-01-02 08:52:07 |
| attackbotsspam | Dec 9 03:48:32 ny01 sshd[25863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Dec 9 03:48:34 ny01 sshd[25863]: Failed password for invalid user gaile from 200.29.108.214 port 36513 ssh2 Dec 9 03:55:18 ny01 sshd[26996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 |
2019-12-09 17:15:16 |
| attackspambots | 2019-12-05T09:32:15.301687abusebot-5.cloudsearch.cf sshd\[8354\]: Invalid user www from 200.29.108.214 port 23873 |
2019-12-05 17:57:40 |
| attack | Nov 15 17:02:17 legacy sshd[3044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Nov 15 17:02:20 legacy sshd[3044]: Failed password for invalid user kongxx from 200.29.108.214 port 50497 ssh2 Nov 15 17:06:44 legacy sshd[3143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 ... |
2019-11-16 05:23:46 |
| attack | Nov 12 09:03:33 meumeu sshd[5153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Nov 12 09:03:35 meumeu sshd[5153]: Failed password for invalid user leavelle from 200.29.108.214 port 22497 ssh2 Nov 12 09:07:42 meumeu sshd[5599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 ... |
2019-11-12 18:27:45 |
| attackbots | ssh failed login |
2019-11-12 02:38:23 |
| attack | Nov 6 02:52:18 php1 sshd\[12952\]: Invalid user 123 from 200.29.108.214 Nov 6 02:52:18 php1 sshd\[12952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co Nov 6 02:52:21 php1 sshd\[12952\]: Failed password for invalid user 123 from 200.29.108.214 port 40065 ssh2 Nov 6 02:56:46 php1 sshd\[13452\]: Invalid user adM1N123 from 200.29.108.214 Nov 6 02:56:46 php1 sshd\[13452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co |
2019-11-06 21:30:35 |
| attackbots | 2019-10-31T06:32:38.903368abusebot.cloudsearch.cf sshd\[29009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co user=root |
2019-10-31 18:47:27 |
| attackbotsspam | 2019-10-30T20:29:45.121666abusebot-8.cloudsearch.cf sshd\[25671\]: Invalid user ahmed2010 from 200.29.108.214 port 22305 |
2019-10-31 04:41:59 |
| attackspambots | 2019-10-02T19:16:53.306157abusebot-8.cloudsearch.cf sshd\[16265\]: Invalid user user from 200.29.108.214 port 12641 |
2019-10-03 03:29:19 |
| attackspambots | Sep 10 01:36:46 hcbbdb sshd\[22366\]: Invalid user zabbix from 200.29.108.214 Sep 10 01:36:46 hcbbdb sshd\[22366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co Sep 10 01:36:48 hcbbdb sshd\[22366\]: Failed password for invalid user zabbix from 200.29.108.214 port 46690 ssh2 Sep 10 01:43:32 hcbbdb sshd\[23116\]: Invalid user admin from 200.29.108.214 Sep 10 01:43:32 hcbbdb sshd\[23116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=selvamotor.emcali.net.co |
2019-09-10 10:00:45 |
| attackspam | Sep 1 22:07:16 web1 sshd\[23087\]: Invalid user filippid_admin from 200.29.108.214 Sep 1 22:07:16 web1 sshd\[23087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Sep 1 22:07:18 web1 sshd\[23087\]: Failed password for invalid user filippid_admin from 200.29.108.214 port 24065 ssh2 Sep 1 22:12:01 web1 sshd\[23553\]: Invalid user raissa from 200.29.108.214 Sep 1 22:12:01 web1 sshd\[23553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 |
2019-09-02 16:25:24 |
| attackbotsspam | Aug 30 01:07:37 ns41 sshd[23918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Aug 30 01:07:39 ns41 sshd[23918]: Failed password for invalid user noi from 200.29.108.214 port 4449 ssh2 |
2019-08-30 07:49:47 |
| attackspambots | Automatic report - Banned IP Access |
2019-08-26 02:41:18 |
| attackspambots | Aug 21 16:59:48 ny01 sshd[24398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Aug 21 16:59:50 ny01 sshd[24398]: Failed password for invalid user ubuntu from 200.29.108.214 port 52737 ssh2 Aug 21 17:04:28 ny01 sshd[24854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 |
2019-08-22 05:21:05 |
| attackspambots | Aug 18 21:28:15 plusreed sshd[6288]: Invalid user damares from 200.29.108.214 ... |
2019-08-19 15:06:14 |
| attackspambots | Aug 7 11:10:21 MK-Soft-VM7 sshd\[5133\]: Invalid user baker from 200.29.108.214 port 46241 Aug 7 11:10:21 MK-Soft-VM7 sshd\[5133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Aug 7 11:10:23 MK-Soft-VM7 sshd\[5133\]: Failed password for invalid user baker from 200.29.108.214 port 46241 ssh2 ... |
2019-08-07 19:46:16 |
| attack | Jul 26 20:31:20 rpi sshd[15001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 Jul 26 20:31:22 rpi sshd[15001]: Failed password for invalid user info from 200.29.108.214 port 16673 ssh2 |
2019-07-27 02:40:07 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.29.108.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10199
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.29.108.214. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072601 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 27 02:40:01 CST 2019
;; MSG SIZE rcvd: 118
214.108.29.200.in-addr.arpa domain name pointer selvamotor.emcali.net.co.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
214.108.29.200.in-addr.arpa name = selvamotor.emcali.net.co.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.145.89 | attackbotsspam | leo_www |
2020-03-29 18:00:47 |
| 195.201.16.70 | attackbots | SSH login attempts. |
2020-03-29 18:33:08 |
| 92.63.196.22 | attackbots | Mar 29 12:05:01 debian-2gb-nbg1-2 kernel: \[7735363.634238\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.63.196.22 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=58410 PROTO=TCP SPT=58815 DPT=61411 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-29 18:27:51 |
| 89.248.160.150 | attackspam | 89.248.160.150 was recorded 23 times by 12 hosts attempting to connect to the following ports: 3331,3330,3328. Incident counter (4h, 24h, all-time): 23, 123, 9081 |
2020-03-29 18:40:33 |
| 5.101.0.209 | attackbots | Unauthorized connection attempt detected from IP address 5.101.0.209 to port 8081 |
2020-03-29 18:12:31 |
| 134.209.90.139 | attack | 2020-03-29T11:44:57.445429vps773228.ovh.net sshd[7645]: Invalid user nka from 134.209.90.139 port 33778 2020-03-29T11:44:59.580336vps773228.ovh.net sshd[7645]: Failed password for invalid user nka from 134.209.90.139 port 33778 ssh2 2020-03-29T11:49:53.706556vps773228.ovh.net sshd[9452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.139 user=mail 2020-03-29T11:49:55.460149vps773228.ovh.net sshd[9452]: Failed password for mail from 134.209.90.139 port 46164 ssh2 2020-03-29T11:54:52.429400vps773228.ovh.net sshd[11284]: Invalid user mikael from 134.209.90.139 port 58552 ... |
2020-03-29 18:47:42 |
| 183.82.100.141 | attack | 5x Failed Password |
2020-03-29 18:02:20 |
| 202.3.225.155 | attackspam | SSH login attempts. |
2020-03-29 18:47:22 |
| 203.159.249.215 | attack | Brute-force attempt banned |
2020-03-29 18:10:07 |
| 157.245.181.249 | attackbots | SSH Brute-Forcing (server1) |
2020-03-29 18:40:06 |
| 198.12.75.105 | attackspam | Mar 29 05:55:21 |
2020-03-29 18:42:01 |
| 78.31.154.15 | attack | Mar 29 11:57:16 dcd-gentoo sshd[13412]: Invalid user 109.248.237.112 - SSH-2.0-Ope.SSH_5.3\r from 78.31.154.15 port 49122 Mar 29 11:57:21 dcd-gentoo sshd[13416]: Invalid user 109.248.237.112 - SSH-2.0-Ope.SSH_5.3\r from 78.31.154.15 port 50378 Mar 29 11:57:23 dcd-gentoo sshd[13419]: Invalid user 109.248.237.112 - SSH-2.0-Ope.SSH_5.3\r from 78.31.154.15 port 51006 ... |
2020-03-29 18:12:00 |
| 192.241.237.68 | attack | Unauthorized connection attempt detected from IP address 192.241.237.68 to port 8181 |
2020-03-29 18:13:34 |
| 159.203.34.76 | attackbots | 2020-03-29T08:24:08.357333struts4.enskede.local sshd\[11583\]: Invalid user zuo from 159.203.34.76 port 48795 2020-03-29T08:24:08.365215struts4.enskede.local sshd\[11583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.34.76 2020-03-29T08:24:11.871814struts4.enskede.local sshd\[11583\]: Failed password for invalid user zuo from 159.203.34.76 port 48795 ssh2 2020-03-29T08:29:31.867413struts4.enskede.local sshd\[11624\]: Invalid user nxt from 159.203.34.76 port 49001 2020-03-29T08:29:31.873324struts4.enskede.local sshd\[11624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.34.76 ... |
2020-03-29 18:33:49 |
| 67.195.204.73 | attackbotsspam | SSH login attempts. |
2020-03-29 18:37:53 |