城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.16.14.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.16.14.11. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 01:49:17 CST 2025
;; MSG SIZE rcvd: 105
11.14.16.219.in-addr.arpa domain name pointer softbank219016014011.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.14.16.219.in-addr.arpa name = softbank219016014011.bbtec.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.38.144.32 | attack | Too many connections or unauthorized access detected from Yankee banned ip |
2019-09-30 16:23:34 |
| 190.211.141.217 | attackbots | Sep 29 21:59:25 friendsofhawaii sshd\[18192\]: Invalid user silvana from 190.211.141.217 Sep 29 21:59:25 friendsofhawaii sshd\[18192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217 Sep 29 21:59:27 friendsofhawaii sshd\[18192\]: Failed password for invalid user silvana from 190.211.141.217 port 38696 ssh2 Sep 29 22:05:03 friendsofhawaii sshd\[18653\]: Invalid user admin from 190.211.141.217 Sep 29 22:05:03 friendsofhawaii sshd\[18653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217 |
2019-09-30 16:18:20 |
| 222.254.230.212 | attackspambots | 8081/tcp [2019-09-30]1pkt |
2019-09-30 16:34:02 |
| 163.172.38.122 | attackbotsspam | Sep 30 10:17:08 hosting sshd[13205]: Invalid user craft from 163.172.38.122 port 37840 ... |
2019-09-30 16:19:53 |
| 222.186.175.216 | attackspam | Sep 30 08:34:40 marvibiene sshd[1975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Sep 30 08:34:42 marvibiene sshd[1975]: Failed password for root from 222.186.175.216 port 64966 ssh2 Sep 30 08:34:46 marvibiene sshd[1975]: Failed password for root from 222.186.175.216 port 64966 ssh2 Sep 30 08:34:40 marvibiene sshd[1975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Sep 30 08:34:42 marvibiene sshd[1975]: Failed password for root from 222.186.175.216 port 64966 ssh2 Sep 30 08:34:46 marvibiene sshd[1975]: Failed password for root from 222.186.175.216 port 64966 ssh2 ... |
2019-09-30 16:36:18 |
| 122.192.33.102 | attackbots | Sep 30 00:43:10 mail sshd\[15946\]: Invalid user anon from 122.192.33.102 Sep 30 00:43:10 mail sshd\[15946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.33.102 ... |
2019-09-30 16:30:06 |
| 14.183.72.31 | attackspambots | 8081/tcp [2019-09-30]1pkt |
2019-09-30 16:27:22 |
| 159.192.217.237 | attack | 445/tcp [2019-09-30]1pkt |
2019-09-30 16:03:49 |
| 130.61.28.159 | attack | Sep 30 07:59:42 venus sshd\[20293\]: Invalid user lx from 130.61.28.159 port 60336 Sep 30 07:59:42 venus sshd\[20293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.28.159 Sep 30 07:59:44 venus sshd\[20293\]: Failed password for invalid user lx from 130.61.28.159 port 60336 ssh2 ... |
2019-09-30 16:07:56 |
| 120.29.155.122 | attackbotsspam | Sep 30 04:20:12 ny01 sshd[26894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.29.155.122 Sep 30 04:20:14 ny01 sshd[26894]: Failed password for invalid user sunusbot1 from 120.29.155.122 port 34056 ssh2 Sep 30 04:25:18 ny01 sshd[28203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.29.155.122 |
2019-09-30 16:37:14 |
| 37.49.230.10 | attackspam | 3283/udp 623/udp 3283/tcp... [2019-08-03/09-28]72pkt,1pt.(tcp),13pt.(udp) |
2019-09-30 16:03:20 |
| 205.185.118.152 | attackspam | DATE:2019-09-30 05:54:55, IP:205.185.118.152, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-09-30 16:12:42 |
| 222.186.52.124 | attackbotsspam | Sep 30 10:39:05 MK-Soft-VM4 sshd[2620]: Failed password for root from 222.186.52.124 port 11494 ssh2 Sep 30 10:39:07 MK-Soft-VM4 sshd[2620]: Failed password for root from 222.186.52.124 port 11494 ssh2 ... |
2019-09-30 16:42:06 |
| 151.41.101.72 | attackbots | Automatic report - Port Scan Attack |
2019-09-30 16:43:42 |
| 155.12.58.126 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/155.12.58.126/ TZ - 1H : (9) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TZ NAME ASN : ASN37084 IP : 155.12.58.126 CIDR : 155.12.48.0/20 PREFIX COUNT : 56 UNIQUE IP COUNT : 54528 WYKRYTE ATAKI Z ASN37084 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 INFO : SERVER - Looking for resource vulnerabilities Detected and Blocked by ADMIN - data recovery |
2019-09-30 16:06:38 |