城市(city): unknown
省份(region): unknown
国家(country): Republic of China (ROC)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.128.116.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20041
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.128.116.222. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:08:09 CST 2022
;; MSG SIZE rcvd: 108
222.116.128.220.in-addr.arpa domain name pointer obu.com.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
222.116.128.220.in-addr.arpa name = obu.com.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.15.190.203 | attackspambots | Automatic report - Banned IP Access |
2019-07-15 17:34:41 |
| 223.99.126.67 | attack | Jul 15 08:34:33 pl3server sshd[2128386]: Invalid user one from 223.99.126.67 Jul 15 08:34:33 pl3server sshd[2128386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.126.67 Jul 15 08:34:36 pl3server sshd[2128386]: Failed password for invalid user one from 223.99.126.67 port 41062 ssh2 Jul 15 08:34:36 pl3server sshd[2128386]: Received disconnect from 223.99.126.67: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=223.99.126.67 |
2019-07-15 17:18:19 |
| 191.53.57.57 | attack | 2019-07-15 08:18:21 plain_virtual_exim authenticator failed for ([191.53.57.57]) [191.53.57.57]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=191.53.57.57 |
2019-07-15 17:21:11 |
| 14.169.187.0 | attackspam | Jul 15 08:10:20 pl3server sshd[2096606]: Address 14.169.187.0 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 15 08:10:20 pl3server sshd[2096606]: Invalid user admin from 14.169.187.0 Jul 15 08:10:20 pl3server sshd[2096606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.169.187.0 Jul 15 08:10:23 pl3server sshd[2096606]: Failed password for invalid user admin from 14.169.187.0 port 59463 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.169.187.0 |
2019-07-15 17:19:08 |
| 93.23.6.66 | attack | Jul 15 07:51:52 work-partkepr sshd\[5395\]: Invalid user windows from 93.23.6.66 port 40793 Jul 15 07:51:52 work-partkepr sshd\[5395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.23.6.66 ... |
2019-07-15 18:04:56 |
| 90.150.180.66 | attackspam | failed_logins |
2019-07-15 17:52:55 |
| 182.160.114.45 | attackspam | Jul 15 10:03:40 meumeu sshd[11210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.160.114.45 Jul 15 10:03:42 meumeu sshd[11210]: Failed password for invalid user gpu from 182.160.114.45 port 46900 ssh2 Jul 15 10:09:42 meumeu sshd[12282]: Failed password for root from 182.160.114.45 port 45152 ssh2 ... |
2019-07-15 17:49:40 |
| 52.67.16.9 | attack | Jul 15 09:51:02 server sshd[25389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.67.16.9 ... |
2019-07-15 17:29:02 |
| 104.236.192.6 | attackspam | 2019-07-15T08:00:43.082092abusebot.cloudsearch.cf sshd\[16969\]: Invalid user otrs from 104.236.192.6 port 59832 |
2019-07-15 17:43:10 |
| 193.70.90.59 | attackbots | 2019-07-15T08:02:45.169605abusebot-2.cloudsearch.cf sshd\[27769\]: Invalid user sonar from 193.70.90.59 port 38404 |
2019-07-15 17:44:15 |
| 206.189.36.106 | attackspam | Forbidden directory scan :: 2019/07/15 16:24:51 [error] 1106#1106: *71014 access forbidden by rule, client: 206.189.36.106, server: [censored_1], request: "GET /2017.sql HTTP/1.1", host: "[censored_1]", referrer: "http://[censored_1]/2017.sql" |
2019-07-15 18:13:18 |
| 89.248.171.176 | attackbots | *Port Scan* detected from 89.248.171.176 (NL/Netherlands/no-reverse-dns-configured.com). 4 hits in the last 85 seconds |
2019-07-15 17:59:25 |
| 96.92.57.113 | attackbotsspam | Automatic report - Port Scan Attack |
2019-07-15 18:09:37 |
| 129.204.116.250 | attackspam | Jul 15 04:25:11 plusreed sshd[20864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.116.250 user=root Jul 15 04:25:13 plusreed sshd[20864]: Failed password for root from 129.204.116.250 port 33556 ssh2 ... |
2019-07-15 17:26:15 |
| 45.236.75.140 | attackbotsspam | Jul 15 08:15:38 rigel postfix/smtpd[31991]: warning: hostname 45-236-75-140.meganet.com.br does not resolve to address 45.236.75.140: Name or service not known Jul 15 08:15:38 rigel postfix/smtpd[31991]: connect from unknown[45.236.75.140] Jul 15 08:15:42 rigel postfix/smtpd[31991]: warning: unknown[45.236.75.140]: SASL CRAM-MD5 authentication failed: authentication failure Jul 15 08:15:42 rigel postfix/smtpd[31991]: warning: unknown[45.236.75.140]: SASL PLAIN authentication failed: authentication failure Jul 15 08:15:44 rigel postfix/smtpd[31991]: warning: unknown[45.236.75.140]: SASL LOGIN authentication failed: authentication failure ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.236.75.140 |
2019-07-15 18:21:12 |