城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.149.209.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.149.209.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:16:47 CST 2025
;; MSG SIZE rcvd: 107
b'Host 71.209.149.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.149.209.71.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 67.205.180.70 | attack | TCP ports : 4418 / 28074 |
2020-10-01 19:20:48 |
| 64.227.10.134 | attackspam | Invalid user mexal from 64.227.10.134 port 38652 |
2020-10-01 19:26:34 |
| 49.88.112.70 | attack | Oct 1 16:28:22 mx sshd[1091318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root Oct 1 16:28:24 mx sshd[1091318]: Failed password for root from 49.88.112.70 port 26174 ssh2 Oct 1 16:28:27 mx sshd[1091318]: Failed password for root from 49.88.112.70 port 26174 ssh2 Oct 1 16:29:19 mx sshd[1091323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root Oct 1 16:29:20 mx sshd[1091323]: Failed password for root from 49.88.112.70 port 36570 ssh2 ... |
2020-10-01 19:13:56 |
| 5.39.82.14 | attack | Automatic report - XMLRPC Attack |
2020-10-01 19:27:19 |
| 182.23.3.226 | attack | Invalid user ftpuser from 182.23.3.226 port 52696 |
2020-10-01 19:24:37 |
| 185.51.76.148 | attack | Sep 30 22:34:17 marvibiene sshd[10134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.76.148 Sep 30 22:34:19 marvibiene sshd[10134]: Failed password for invalid user dani from 185.51.76.148 port 35940 ssh2 |
2020-10-01 19:07:39 |
| 39.79.144.75 | attackbotsspam | Automatic report - Banned IP Access |
2020-10-01 19:03:27 |
| 45.146.164.169 | attack | firewall-block, port(s): 1013/tcp, 1025/tcp, 1133/tcp, 2085/tcp, 3302/tcp, 4256/tcp, 4490/tcp, 4545/tcp, 4911/tcp, 8891/tcp, 11389/tcp, 12549/tcp |
2020-10-01 19:30:38 |
| 192.241.231.241 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-10-01 19:24:08 |
| 178.128.121.137 | attackbots | Invalid user bert from 178.128.121.137 port 43558 |
2020-10-01 18:57:40 |
| 221.156.126.1 | attackspambots | $f2bV_matches |
2020-10-01 19:10:38 |
| 142.93.240.192 | attackspambots | Oct 1 12:49:00 localhost sshd\[19580\]: Invalid user alex from 142.93.240.192 Oct 1 12:49:00 localhost sshd\[19580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.240.192 Oct 1 12:49:02 localhost sshd\[19580\]: Failed password for invalid user alex from 142.93.240.192 port 37830 ssh2 Oct 1 12:52:58 localhost sshd\[19839\]: Invalid user jiaxing from 142.93.240.192 Oct 1 12:52:58 localhost sshd\[19839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.240.192 ... |
2020-10-01 19:00:30 |
| 58.71.15.10 | attack | Oct 1 09:54:14 ns3033917 sshd[31397]: Invalid user support from 58.71.15.10 port 59158 Oct 1 09:54:16 ns3033917 sshd[31397]: Failed password for invalid user support from 58.71.15.10 port 59158 ssh2 Oct 1 10:07:55 ns3033917 sshd[31527]: Invalid user benjamin from 58.71.15.10 port 48978 ... |
2020-10-01 18:58:52 |
| 52.83.41.12 | attackbotsspam | $f2bV_matches |
2020-10-01 19:30:11 |
| 139.59.8.10 | attackbots | Sep 30 21:33:39 localhost sshd\[21589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.8.10 user=root Sep 30 21:33:40 localhost sshd\[21589\]: Failed password for root from 139.59.8.10 port 39064 ssh2 Sep 30 21:33:45 localhost sshd\[21594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.8.10 user=root Sep 30 21:33:47 localhost sshd\[21594\]: Failed password for root from 139.59.8.10 port 39644 ssh2 |
2020-10-01 19:29:18 |