城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.224.148.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.224.148.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120602 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 07:46:50 CST 2024
;; MSG SIZE rcvd: 107
b'Host 75.148.224.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.224.148.75.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 174.255.132.202 | attack | I suspect this IP address is being used by my ex and associates.,aka fellow convicts, it is with Verizon which seems to be the carrier always used. it was inconclusive on location, is that something you can assist with? Sincerely Jeanie Smith 8175834552 |
2020-01-20 22:49:13 |
| 117.204.240.129 | attackbotsspam | Unauthorized IMAP connection attempt |
2020-01-20 22:40:55 |
| 42.119.181.41 | attackspambots | Unauthorized connection attempt detected from IP address 42.119.181.41 to port 23 [J] |
2020-01-20 23:08:40 |
| 123.160.246.55 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.160.246.55 Failed password for invalid user testuser from 123.160.246.55 port 37316 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.160.246.55 user=root Failed password for root from 123.160.246.55 port 36010 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.160.246.55 user=root |
2020-01-20 22:33:19 |
| 69.181.180.81 | attackspambots | Unauthorized connection attempt detected from IP address 69.181.180.81 to port 2220 [J] |
2020-01-20 22:31:33 |
| 103.21.78.29 | attackbotsspam | Automatic report - Port Scan Attack |
2020-01-20 22:44:23 |
| 62.234.2.59 | attack | $f2bV_matches |
2020-01-20 22:37:51 |
| 36.56.155.4 | attackspam | Unauthorized connection attempt detected from IP address 36.56.155.4 to port 2323 [J] |
2020-01-20 23:10:20 |
| 182.155.102.98 | attackspam | Unauthorized connection attempt detected from IP address 182.155.102.98 to port 5555 [T] |
2020-01-20 22:54:34 |
| 42.113.229.156 | attack | Unauthorized connection attempt detected from IP address 42.113.229.156 to port 23 [J] |
2020-01-20 23:10:00 |
| 1.54.180.254 | attackbotsspam | Unauthorized connection attempt detected from IP address 1.54.180.254 to port 23 [J] |
2020-01-20 23:11:18 |
| 217.122.30.32 | attack | Jan 20 12:04:46 garuda sshd[916769]: Invalid user guest from 217.122.30.32 Jan 20 12:04:46 garuda sshd[916769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217-122-30-32.cable.dynamic.v4.ziggo.nl Jan 20 12:04:48 garuda sshd[916769]: Failed password for invalid user guest from 217.122.30.32 port 56852 ssh2 Jan 20 12:04:48 garuda sshd[916769]: Received disconnect from 217.122.30.32: 11: Bye Bye [preauth] Jan 20 12:18:31 garuda sshd[922414]: Invalid user common from 217.122.30.32 Jan 20 12:18:31 garuda sshd[922414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217-122-30-32.cable.dynamic.v4.ziggo.nl Jan 20 12:18:34 garuda sshd[922414]: Failed password for invalid user common from 217.122.30.32 port 55814 ssh2 Jan 20 12:18:34 garuda sshd[922414]: Received disconnect from 217.122.30.32: 11: Bye Bye [preauth] Jan 20 12:20:10 garuda sshd[923337]: Invalid user av from 217.122.30.32 Jan 20 1........ ------------------------------- |
2020-01-20 22:32:17 |
| 128.199.233.65 | attackspam | Jan 20 10:31:45 giraffe sshd[30472]: Invalid user hy from 128.199.233.65 Jan 20 10:31:45 giraffe sshd[30472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.65 Jan 20 10:31:47 giraffe sshd[30472]: Failed password for invalid user hy from 128.199.233.65 port 50224 ssh2 Jan 20 10:31:47 giraffe sshd[30472]: Received disconnect from 128.199.233.65 port 50224:11: Bye Bye [preauth] Jan 20 10:31:47 giraffe sshd[30472]: Disconnected from 128.199.233.65 port 50224 [preauth] Jan 20 10:39:18 giraffe sshd[30894]: Invalid user qq from 128.199.233.65 Jan 20 10:39:19 giraffe sshd[30894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.65 Jan 20 10:39:20 giraffe sshd[30894]: Failed password for invalid user qq from 128.199.233.65 port 45630 ssh2 Jan 20 10:39:20 giraffe sshd[30894]: Received disconnect from 128.199.233.65 port 45630:11: Bye Bye [preauth] Jan 20 10:39:20 giraffe sshd[........ ------------------------------- |
2020-01-20 22:47:03 |
| 46.38.144.202 | attackbots | Jan 20 15:40:44 relay postfix/smtpd\[25710\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 20 15:40:54 relay postfix/smtpd\[22982\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 20 15:41:32 relay postfix/smtpd\[23014\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 20 15:41:41 relay postfix/smtpd\[27825\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 20 15:42:21 relay postfix/smtpd\[23616\]: warning: unknown\[46.38.144.202\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-01-20 22:42:43 |
| 37.49.227.109 | attackbots | Unauthorized connection attempt detected from IP address 37.49.227.109 to port 81 [J] |
2020-01-20 22:43:23 |