城市(city): Yogyakarta
省份(region): Yogyakarta
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.169.234.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;202.169.234.14. IN A
;; AUTHORITY SECTION:
. 499 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023080701 1800 900 604800 86400
;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 08 11:51:01 CST 2023
;; MSG SIZE rcvd: 107
14.234.169.202.in-addr.arpa has no PTR record
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 14.234.169.202.in-addr.arpa.: No answer
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 223.75.51.13 | attack | Sep 20 05:30:47 vps691689 sshd[32179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.75.51.13 Sep 20 05:30:49 vps691689 sshd[32179]: Failed password for invalid user stea from 223.75.51.13 port 42570 ssh2 Sep 20 05:36:01 vps691689 sshd[32295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.75.51.13 ... |
2019-09-20 13:15:20 |
| 200.10.65.113 | attackbotsspam | Unauthorized connection attempt from IP address 200.10.65.113 on Port 445(SMB) |
2019-09-20 13:28:34 |
| 222.242.223.75 | attackspambots | Sep 20 08:00:03 pkdns2 sshd\[30098\]: Invalid user suniltex from 222.242.223.75Sep 20 08:00:06 pkdns2 sshd\[30098\]: Failed password for invalid user suniltex from 222.242.223.75 port 31585 ssh2Sep 20 08:04:59 pkdns2 sshd\[30320\]: Invalid user cs from 222.242.223.75Sep 20 08:05:01 pkdns2 sshd\[30320\]: Failed password for invalid user cs from 222.242.223.75 port 28769 ssh2Sep 20 08:09:44 pkdns2 sshd\[30520\]: Invalid user persona from 222.242.223.75Sep 20 08:09:46 pkdns2 sshd\[30520\]: Failed password for invalid user persona from 222.242.223.75 port 25985 ssh2 ... |
2019-09-20 13:43:13 |
| 106.13.74.162 | attack | Sep 19 18:55:04 php1 sshd\[16218\]: Invalid user abc123 from 106.13.74.162 Sep 19 18:55:04 php1 sshd\[16218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.162 Sep 19 18:55:06 php1 sshd\[16218\]: Failed password for invalid user abc123 from 106.13.74.162 port 38106 ssh2 Sep 19 19:01:10 php1 sshd\[16800\]: Invalid user geoffrey from 106.13.74.162 Sep 19 19:01:10 php1 sshd\[16800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.162 |
2019-09-20 13:14:49 |
| 202.169.235.17 | attackbots | email spam |
2019-09-20 13:49:09 |
| 196.218.97.82 | attackspam | Unauthorized connection attempt from IP address 196.218.97.82 on Port 445(SMB) |
2019-09-20 13:17:41 |
| 49.214.162.36 | attackspambots | Unauthorized connection attempt from IP address 49.214.162.36 on Port 445(SMB) |
2019-09-20 13:18:42 |
| 106.75.21.242 | attackspam | Sep 20 05:21:00 site2 sshd\[51186\]: Invalid user gitlog from 106.75.21.242Sep 20 05:21:02 site2 sshd\[51186\]: Failed password for invalid user gitlog from 106.75.21.242 port 45456 ssh2Sep 20 05:25:54 site2 sshd\[51449\]: Invalid user suge from 106.75.21.242Sep 20 05:25:56 site2 sshd\[51449\]: Failed password for invalid user suge from 106.75.21.242 port 56530 ssh2Sep 20 05:30:57 site2 sshd\[51798\]: Invalid user vagrant from 106.75.21.242 ... |
2019-09-20 13:03:55 |
| 35.240.217.103 | attackbots | Sep 20 07:07:05 SilenceServices sshd[22776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.217.103 Sep 20 07:07:07 SilenceServices sshd[22776]: Failed password for invalid user av from 35.240.217.103 port 60498 ssh2 Sep 20 07:11:07 SilenceServices sshd[24379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.217.103 |
2019-09-20 13:29:06 |
| 158.69.110.31 | attack | Invalid user admin from 158.69.110.31 port 39922 |
2019-09-20 13:44:14 |
| 104.236.61.100 | attack | Sep 20 02:45:29 apollo sshd\[5480\]: Invalid user deploy from 104.236.61.100Sep 20 02:45:32 apollo sshd\[5480\]: Failed password for invalid user deploy from 104.236.61.100 port 53291 ssh2Sep 20 03:03:17 apollo sshd\[5555\]: Invalid user pydio from 104.236.61.100 ... |
2019-09-20 13:12:57 |
| 104.128.69.146 | attackbots | Sep 19 19:34:45 web1 sshd\[4422\]: Invalid user user3 from 104.128.69.146 Sep 19 19:34:45 web1 sshd\[4422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146 Sep 19 19:34:47 web1 sshd\[4422\]: Failed password for invalid user user3 from 104.128.69.146 port 42851 ssh2 Sep 19 19:39:08 web1 sshd\[4873\]: Invalid user jk from 104.128.69.146 Sep 19 19:39:08 web1 sshd\[4873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146 |
2019-09-20 13:44:57 |
| 112.85.42.171 | attack | Sep 20 01:14:49 TORMINT sshd\[27564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.171 user=root Sep 20 01:14:51 TORMINT sshd\[27564\]: Failed password for root from 112.85.42.171 port 50037 ssh2 Sep 20 01:14:54 TORMINT sshd\[27564\]: Failed password for root from 112.85.42.171 port 50037 ssh2 ... |
2019-09-20 13:27:12 |
| 124.74.248.218 | attack | Sep 19 16:48:14 friendsofhawaii sshd\[28125\]: Invalid user audreym from 124.74.248.218 Sep 19 16:48:14 friendsofhawaii sshd\[28125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 Sep 19 16:48:16 friendsofhawaii sshd\[28125\]: Failed password for invalid user audreym from 124.74.248.218 port 55328 ssh2 Sep 19 16:51:43 friendsofhawaii sshd\[28433\]: Invalid user pw from 124.74.248.218 Sep 19 16:51:43 friendsofhawaii sshd\[28433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 |
2019-09-20 13:51:37 |
| 41.39.89.94 | attack | Sep 20 02:36:24 new sshd[15256]: reveeclipse mapping checking getaddrinfo for host-41.39.89.94.tedata.net [41.39.89.94] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 20 02:36:26 new sshd[15256]: Failed password for invalid user ubuntu from 41.39.89.94 port 60086 ssh2 Sep 20 02:36:26 new sshd[15256]: Received disconnect from 41.39.89.94: 11: Bye Bye [preauth] Sep 20 03:08:08 new sshd[23630]: reveeclipse mapping checking getaddrinfo for host-41.39.89.94.tedata.net [41.39.89.94] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 20 03:08:10 new sshd[23630]: Failed password for invalid user , from 41.39.89.94 port 53866 ssh2 Sep 20 03:08:10 new sshd[23630]: Received disconnect from 41.39.89.94: 11: Bye Bye [preauth] Sep 20 03:39:34 new sshd[32348]: reveeclipse mapping checking getaddrinfo for host-41.39.89.94.tedata.net [41.39.89.94] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 20 03:39:35 new sshd[32348]: Failed password for invalid user changeme from 41.39.89.94 port 42126 ssh2 Sep 20 03:39:35........ ------------------------------- |
2019-09-20 13:13:27 |