城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.12.30.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.12.30.163. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:19:33 CST 2025
;; MSG SIZE rcvd: 106
b'Host 163.30.12.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.12.30.163.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 94.102.56.181 | attackspam | firewall-block, port(s): 9609/tcp |
2020-04-22 21:22:25 |
| 50.104.13.15 | spambotsattack | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them |
2020-04-22 21:28:45 |
| 180.76.173.75 | attack | 2020-04-22T12:04:17.137488randservbullet-proofcloud-66.localdomain sshd[30172]: Invalid user info from 180.76.173.75 port 51970 2020-04-22T12:04:17.144527randservbullet-proofcloud-66.localdomain sshd[30172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.173.75 2020-04-22T12:04:17.137488randservbullet-proofcloud-66.localdomain sshd[30172]: Invalid user info from 180.76.173.75 port 51970 2020-04-22T12:04:18.442653randservbullet-proofcloud-66.localdomain sshd[30172]: Failed password for invalid user info from 180.76.173.75 port 51970 ssh2 ... |
2020-04-22 21:09:03 |
| 185.246.38.229 | attackbots | 2020-04-22T12:04:20.094887shield sshd\[18191\]: Invalid user pi from 185.246.38.229 port 54492 2020-04-22T12:04:20.187718shield sshd\[18192\]: Invalid user pi from 185.246.38.229 port 54494 2020-04-22T12:04:20.203323shield sshd\[18191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.38.229 2020-04-22T12:04:20.304239shield sshd\[18192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.38.229 2020-04-22T12:04:22.249548shield sshd\[18191\]: Failed password for invalid user pi from 185.246.38.229 port 54492 ssh2 |
2020-04-22 21:05:22 |
| 106.12.209.117 | attack | Apr 22 15:20:41 hosting sshd[11224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.117 user=root Apr 22 15:20:43 hosting sshd[11224]: Failed password for root from 106.12.209.117 port 47710 ssh2 Apr 22 15:28:59 hosting sshd[11886]: Invalid user test from 106.12.209.117 port 58680 ... |
2020-04-22 21:06:20 |
| 107.173.191.104 | attack | Honeypot attack, port: 445, PTR: 107-173-191-104-host.colocrossing.com. |
2020-04-22 21:29:35 |
| 50.104.13.15 | spambotsattack | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them |
2020-04-22 21:28:07 |
| 95.85.60.251 | attackspambots | Apr 22 13:54:46 lock-38 sshd[1366258]: Disconnected from invalid user admin 95.85.60.251 port 56144 [preauth] Apr 22 14:04:11 lock-38 sshd[1366516]: Invalid user xy from 95.85.60.251 port 60834 Apr 22 14:04:11 lock-38 sshd[1366516]: Invalid user xy from 95.85.60.251 port 60834 Apr 22 14:04:11 lock-38 sshd[1366516]: Failed password for invalid user xy from 95.85.60.251 port 60834 ssh2 Apr 22 14:04:11 lock-38 sshd[1366516]: Disconnected from invalid user xy 95.85.60.251 port 60834 [preauth] ... |
2020-04-22 21:15:01 |
| 222.186.52.86 | attack | Apr 22 15:12:22 OPSO sshd\[5809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86 user=root Apr 22 15:12:24 OPSO sshd\[5809\]: Failed password for root from 222.186.52.86 port 20769 ssh2 Apr 22 15:12:26 OPSO sshd\[5809\]: Failed password for root from 222.186.52.86 port 20769 ssh2 Apr 22 15:12:28 OPSO sshd\[5809\]: Failed password for root from 222.186.52.86 port 20769 ssh2 Apr 22 15:13:32 OPSO sshd\[5901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86 user=root |
2020-04-22 21:25:19 |
| 197.2.80.168 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-22 21:21:41 |
| 194.152.206.93 | attackbotsspam | leo_www |
2020-04-22 21:17:21 |
| 185.176.27.246 | attack | 04/22/2020-09:05:52.937361 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-22 21:08:49 |
| 50.104.13.15 | spambotsattack | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them |
2020-04-22 21:28:10 |
| 50.104.13.15 | spambotsattackproxy | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them...they are blocking this from coming to u......also they edit the logs so PULL ever single one ther |
2020-04-22 21:30:41 |
| 195.211.245.42 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-04-22 21:07:30 |