城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.252.66.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58579
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;222.252.66.80. IN A
;; AUTHORITY SECTION:
. 568 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:10:06 CST 2022
;; MSG SIZE rcvd: 106
80.66.252.222.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.66.252.222.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 94.45.152.86 | attackspambots | postfix |
2019-10-09 23:26:36 |
| 89.245.89.135 | attack | $f2bV_matches |
2019-10-09 23:57:33 |
| 54.36.203.249 | attack | Oct 9 18:22:24 pkdns2 sshd\[40580\]: Invalid user Butter2017 from 54.36.203.249Oct 9 18:22:26 pkdns2 sshd\[40580\]: Failed password for invalid user Butter2017 from 54.36.203.249 port 43446 ssh2Oct 9 18:26:12 pkdns2 sshd\[40760\]: Invalid user 123Discovery from 54.36.203.249Oct 9 18:26:14 pkdns2 sshd\[40760\]: Failed password for invalid user 123Discovery from 54.36.203.249 port 36034 ssh2Oct 9 18:29:59 pkdns2 sshd\[40880\]: Invalid user Pascal-123 from 54.36.203.249Oct 9 18:30:01 pkdns2 sshd\[40880\]: Failed password for invalid user Pascal-123 from 54.36.203.249 port 56832 ssh2 ... |
2019-10-09 23:33:50 |
| 74.83.225.239 | attackspambots | Automatic report - Port Scan Attack |
2019-10-09 23:40:21 |
| 1.6.114.75 | attackbotsspam | Apr 23 13:35:45 vtv3 sshd\[10778\]: Invalid user testftp from 1.6.114.75 port 60256 Apr 23 13:35:45 vtv3 sshd\[10778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75 Apr 23 13:35:47 vtv3 sshd\[10778\]: Failed password for invalid user testftp from 1.6.114.75 port 60256 ssh2 Apr 23 13:45:36 vtv3 sshd\[15928\]: Invalid user vq from 1.6.114.75 port 58576 Apr 23 13:45:36 vtv3 sshd\[15928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75 Apr 23 13:58:17 vtv3 sshd\[22369\]: Invalid user finance from 1.6.114.75 port 54354 Apr 23 13:58:17 vtv3 sshd\[22369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75 Apr 23 13:58:19 vtv3 sshd\[22369\]: Failed password for invalid user finance from 1.6.114.75 port 54354 ssh2 Apr 23 14:01:30 vtv3 sshd\[24141\]: Invalid user admin from 1.6.114.75 port 52272 Apr 23 14:01:30 vtv3 sshd\[24141\]: pam_unix\(sshd:auth\): auth |
2019-10-09 23:53:39 |
| 79.110.201.195 | attack | 2019-10-09T11:25:54.510659hub.schaetter.us sshd\[26915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195 user=root 2019-10-09T11:25:55.808355hub.schaetter.us sshd\[26915\]: Failed password for root from 79.110.201.195 port 43412 ssh2 2019-10-09T11:30:04.715424hub.schaetter.us sshd\[26950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195 user=root 2019-10-09T11:30:06.664781hub.schaetter.us sshd\[26950\]: Failed password for root from 79.110.201.195 port 55184 ssh2 2019-10-09T11:34:28.164887hub.schaetter.us sshd\[26986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195 user=root ... |
2019-10-10 00:00:41 |
| 120.92.133.32 | attackbots | Oct 9 15:36:02 localhost sshd\[10765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.133.32 user=root Oct 9 15:36:04 localhost sshd\[10765\]: Failed password for root from 120.92.133.32 port 28876 ssh2 Oct 9 15:52:54 localhost sshd\[11018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.133.32 user=root ... |
2019-10-10 00:01:37 |
| 183.82.2.251 | attackbotsspam | Oct 9 05:13:16 sachi sshd\[16081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.2.251 user=root Oct 9 05:13:18 sachi sshd\[16081\]: Failed password for root from 183.82.2.251 port 45953 ssh2 Oct 9 05:18:10 sachi sshd\[16495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.2.251 user=root Oct 9 05:18:12 sachi sshd\[16495\]: Failed password for root from 183.82.2.251 port 29736 ssh2 Oct 9 05:23:00 sachi sshd\[16869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.2.251 user=root |
2019-10-09 23:49:58 |
| 59.57.34.58 | attackspambots | 2019-10-09T10:55:26.2496141495-001 sshd\[43653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.57.34.58 user=root 2019-10-09T10:55:28.1270051495-001 sshd\[43653\]: Failed password for root from 59.57.34.58 port 37219 ssh2 2019-10-09T11:01:36.5758341495-001 sshd\[44164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.57.34.58 user=root 2019-10-09T11:01:38.5790841495-001 sshd\[44164\]: Failed password for root from 59.57.34.58 port 54441 ssh2 2019-10-09T11:07:53.0509321495-001 sshd\[44612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.57.34.58 user=root 2019-10-09T11:07:55.0089951495-001 sshd\[44612\]: Failed password for root from 59.57.34.58 port 43413 ssh2 ... |
2019-10-09 23:40:10 |
| 14.116.223.234 | attack | Automatic report - Banned IP Access |
2019-10-09 23:44:56 |
| 123.207.233.84 | attackbots | Oct 9 17:47:17 localhost sshd\[24241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.233.84 user=root Oct 9 17:47:19 localhost sshd\[24241\]: Failed password for root from 123.207.233.84 port 53774 ssh2 Oct 9 17:52:18 localhost sshd\[24674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.233.84 user=root |
2019-10-09 23:55:26 |
| 200.95.175.48 | attack | Oct 9 16:29:32 vpn01 sshd[21388]: Failed password for root from 200.95.175.48 port 56470 ssh2 ... |
2019-10-10 00:04:53 |
| 192.144.155.63 | attack | Oct 9 16:56:17 ns381471 sshd[28576]: Failed password for root from 192.144.155.63 port 41736 ssh2 Oct 9 17:00:51 ns381471 sshd[28739]: Failed password for root from 192.144.155.63 port 43272 ssh2 |
2019-10-10 00:02:40 |
| 23.129.64.205 | attack | 2019-10-09T12:36:09.581265abusebot.cloudsearch.cf sshd\[19673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.205 user=root |
2019-10-10 00:03:49 |
| 222.186.175.150 | attackspambots | Oct 9 20:13:49 gw1 sshd[2587]: Failed password for root from 222.186.175.150 port 35576 ssh2 Oct 9 20:14:08 gw1 sshd[2587]: error: maximum authentication attempts exceeded for root from 222.186.175.150 port 35576 ssh2 [preauth] ... |
2019-10-09 23:27:34 |