城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.149.105.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.149.105.180. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:11:36 CST 2025
;; MSG SIZE rcvd: 108
Host 180.105.149.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.149.105.180.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 5.101.0.209 | attack | Unauthorized connection attempt detected from IP address 5.101.0.209 to port 8081 [T] |
2020-05-04 17:01:44 |
| 49.206.215.207 | attackspambots | 1588564350 - 05/04/2020 05:52:30 Host: 49.206.215.207/49.206.215.207 Port: 445 TCP Blocked |
2020-05-04 17:25:40 |
| 111.230.236.93 | attackbotsspam | May 4 06:54:32 * sshd[11816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.236.93 May 4 06:54:34 * sshd[11816]: Failed password for invalid user shaker from 111.230.236.93 port 38308 ssh2 |
2020-05-04 17:14:19 |
| 205.185.127.219 | attackspam | ENG,WP GET /wp-login.php |
2020-05-04 17:28:20 |
| 218.94.103.226 | attackbots | May 4 10:55:31 santamaria sshd\[4683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.103.226 user=root May 4 10:55:33 santamaria sshd\[4683\]: Failed password for root from 218.94.103.226 port 46766 ssh2 May 4 11:00:34 santamaria sshd\[4757\]: Invalid user vtu from 218.94.103.226 May 4 11:00:34 santamaria sshd\[4757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.103.226 ... |
2020-05-04 17:36:21 |
| 41.46.240.138 | attackbots | May 4 09:36:02 lukav-desktop sshd\[16921\]: Invalid user vila from 41.46.240.138 May 4 09:36:02 lukav-desktop sshd\[16921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.46.240.138 May 4 09:36:03 lukav-desktop sshd\[16921\]: Failed password for invalid user vila from 41.46.240.138 port 57358 ssh2 May 4 09:44:53 lukav-desktop sshd\[25132\]: Invalid user virus from 41.46.240.138 May 4 09:44:53 lukav-desktop sshd\[25132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.46.240.138 |
2020-05-04 17:29:39 |
| 107.13.186.21 | attack | 2020-05-04T07:22:14.807330abusebot-6.cloudsearch.cf sshd[8585]: Invalid user huiqi from 107.13.186.21 port 43860 2020-05-04T07:22:14.815554abusebot-6.cloudsearch.cf sshd[8585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21 2020-05-04T07:22:14.807330abusebot-6.cloudsearch.cf sshd[8585]: Invalid user huiqi from 107.13.186.21 port 43860 2020-05-04T07:22:17.133243abusebot-6.cloudsearch.cf sshd[8585]: Failed password for invalid user huiqi from 107.13.186.21 port 43860 ssh2 2020-05-04T07:26:05.837737abusebot-6.cloudsearch.cf sshd[8832]: Invalid user cloud_user from 107.13.186.21 port 52582 2020-05-04T07:26:05.844789abusebot-6.cloudsearch.cf sshd[8832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21 2020-05-04T07:26:05.837737abusebot-6.cloudsearch.cf sshd[8832]: Invalid user cloud_user from 107.13.186.21 port 52582 2020-05-04T07:26:08.207782abusebot-6.cloudsearch.cf sshd[8832]: Fail ... |
2020-05-04 17:23:59 |
| 45.136.108.85 | attack | May 4 10:46:37 nextcloud sshd\[15017\]: Invalid user 0 from 45.136.108.85 May 4 10:46:37 nextcloud sshd\[15017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.136.108.85 May 4 10:46:39 nextcloud sshd\[15017\]: Failed password for invalid user 0 from 45.136.108.85 port 11708 ssh2 |
2020-05-04 17:24:42 |
| 222.186.30.218 | attackbotsspam | Fail2Ban Ban Triggered (2) |
2020-05-04 17:38:42 |
| 220.128.159.121 | attack | $f2bV_matches |
2020-05-04 17:01:20 |
| 109.95.182.42 | attackspambots | SSH Brute Force |
2020-05-04 17:33:28 |
| 116.196.93.81 | attackspambots | May 4 07:19:35 vps sshd[954300]: Failed password for invalid user kiosk from 116.196.93.81 port 37954 ssh2 May 4 07:22:38 vps sshd[971943]: Invalid user Elizabeth from 116.196.93.81 port 48094 May 4 07:22:38 vps sshd[971943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.81 May 4 07:22:41 vps sshd[971943]: Failed password for invalid user Elizabeth from 116.196.93.81 port 48094 ssh2 May 4 07:25:39 vps sshd[989512]: Invalid user testuser from 116.196.93.81 port 58222 ... |
2020-05-04 17:21:35 |
| 129.211.10.228 | attackbots | May 4 04:47:15 ny01 sshd[13357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.10.228 May 4 04:47:17 ny01 sshd[13357]: Failed password for invalid user netadmin from 129.211.10.228 port 50776 ssh2 May 4 04:51:57 ny01 sshd[13918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.10.228 |
2020-05-04 17:09:08 |
| 5.62.62.43 | attack | 0,33-06/05 [bc36/m08] PostRequest-Spammer scoring: essen |
2020-05-04 17:36:01 |
| 27.254.68.108 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-05-04 17:04:29 |