城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.34.158.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.34.158.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:17:50 CST 2025
;; MSG SIZE rcvd: 106
Host 13.158.34.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.34.158.13.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
195.252.88.70 | attack | Automatic report - Port Scan Attack |
2020-07-19 06:26:28 |
66.249.75.192 | attackspam | \[Sat Jul 18 21:49:53 2020\] \[error\] \[client 66.249.75.192\] client denied by server configuration: /var/www/html/default/robots.txt \[Sat Jul 18 21:49:53 2020\] \[error\] \[client 66.249.75.192\] client denied by server configuration: /var/www/html/default/ \[Sat Jul 18 21:49:53 2020\] \[error\] \[client 66.249.75.192\] client denied by server configuration: /var/www/html/default/.noindex.html ... |
2020-07-19 06:20:42 |
222.186.173.183 | attack | Jul 19 00:12:30 home sshd[5810]: Failed password for root from 222.186.173.183 port 34518 ssh2 Jul 19 00:12:33 home sshd[5810]: Failed password for root from 222.186.173.183 port 34518 ssh2 Jul 19 00:12:43 home sshd[5810]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 34518 ssh2 [preauth] Jul 19 00:12:49 home sshd[5849]: Failed password for root from 222.186.173.183 port 46650 ssh2 Jul 19 00:12:53 home sshd[5849]: Failed password for root from 222.186.173.183 port 46650 ssh2 Jul 19 00:12:55 home sshd[5849]: Failed password for root from 222.186.173.183 port 46650 ssh2 Jul 19 00:13:05 home sshd[5849]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 46650 ssh2 [preauth] Jul 19 00:13:11 home sshd[5880]: Failed password for root from 222.186.173.183 port 9232 ssh2 ... |
2020-07-19 06:17:01 |
222.186.175.148 | attackspam | Fail2Ban Ban Triggered (2) |
2020-07-19 06:23:45 |
107.214.242.155 | attackspam | firewall-block, port(s): 2323/tcp |
2020-07-19 06:01:34 |
174.138.20.105 | attack | Jul 18 23:52:32 server sshd[6370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.105 Jul 18 23:52:34 server sshd[6370]: Failed password for invalid user norman from 174.138.20.105 port 51108 ssh2 Jul 18 23:57:21 server sshd[6760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.105 ... |
2020-07-19 06:04:07 |
185.143.73.84 | attack | Jul 18 23:52:33 s1 postfix/submission/smtpd\[26469\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:53:01 s1 postfix/submission/smtpd\[26469\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:53:29 s1 postfix/submission/smtpd\[26469\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:53:57 s1 postfix/submission/smtpd\[23694\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:54:26 s1 postfix/submission/smtpd\[26469\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:54:53 s1 postfix/submission/smtpd\[23694\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:55:22 s1 postfix/submission/smtpd\[26469\]: warning: unknown\[185.143.73.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 23:55:51 s1 postfix/submission/smtpd\[23694\]: warning: unknown\[ |
2020-07-19 06:21:20 |
31.184.253.101 | attackspambots | Invalid user pratap from 31.184.253.101 port 35780 |
2020-07-19 06:07:06 |
91.203.22.195 | attack | Invalid user aish from 91.203.22.195 port 38940 |
2020-07-19 06:23:29 |
185.143.73.175 | attackspambots | 2020-07-18 20:56:42 auth_plain authenticator failed for (User) [185.143.73.175]: 535 Incorrect authentication data (set_id=ctype@mail.csmailer.org) 2020-07-18 20:57:07 auth_plain authenticator failed for (User) [185.143.73.175]: 535 Incorrect authentication data (set_id=gesfin@mail.csmailer.org) 2020-07-18 20:57:25 auth_plain authenticator failed for (User) [185.143.73.175]: 535 Incorrect authentication data (set_id=act@mail.csmailer.org) 2020-07-18 20:57:51 auth_plain authenticator failed for (User) [185.143.73.175]: 535 Incorrect authentication data (set_id=psm@mail.csmailer.org) 2020-07-18 20:58:17 auth_plain authenticator failed for (User) [185.143.73.175]: 535 Incorrect authentication data (set_id=mail.media@mail.csmailer.org) ... |
2020-07-19 06:08:25 |
41.90.62.161 | attackspambots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-07-19 06:13:47 |
47.50.246.114 | attackbots | Invalid user sophia from 47.50.246.114 port 50526 |
2020-07-19 06:05:39 |
124.237.65.107 | attackspam | Email login attempts - too many failed mail login attempts (SMTP) |
2020-07-19 06:09:19 |
52.249.185.41 | attackbotsspam | Jul 18 12:27:04 *hidden* sshd[14412]: Invalid user yamato from 52.249.185.41 port 54634 Jul 18 12:27:04 *hidden* sshd[14412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.249.185.41 Jul 18 12:27:06 *hidden* sshd[14412]: Failed password for invalid user yamato from 52.249.185.41 port 54634 ssh2 |
2020-07-19 05:54:16 |
157.230.216.233 | attack | Invalid user student from 157.230.216.233 port 40960 |
2020-07-19 06:19:12 |