城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.253.145.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;222.253.145.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:03:20 CST 2025
;; MSG SIZE rcvd: 108
220.145.253.222.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.145.253.222.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.187.111.160 | attack | Jan 8 22:08:33 debian-2gb-nbg1-2 kernel: \[777028.164622\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=124.187.111.160 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x40 TTL=238 ID=16080 DF PROTO=TCP SPT=60441 DPT=81 WINDOW=14600 RES=0x00 SYN URGP=0 |
2020-01-09 07:47:27 |
| 111.67.197.54 | attackbotsspam | Unauthorized connection attempt detected from IP address 111.67.197.54 to port 22 [T] |
2020-01-09 07:53:22 |
| 188.166.165.100 | attack | Jan 8 12:10:47 web9 sshd\[12572\]: Invalid user wsn from 188.166.165.100 Jan 8 12:10:47 web9 sshd\[12572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.165.100 Jan 8 12:10:49 web9 sshd\[12572\]: Failed password for invalid user wsn from 188.166.165.100 port 46788 ssh2 Jan 8 12:13:41 web9 sshd\[13112\]: Invalid user webmin from 188.166.165.100 Jan 8 12:13:41 web9 sshd\[13112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.165.100 |
2020-01-09 07:30:59 |
| 187.138.186.146 | attackbots | Unauthorized connection attempt detected from IP address 187.138.186.146 to port 445 |
2020-01-09 07:42:06 |
| 37.49.231.120 | attackspam | Unauthorized connection attempt detected from IP address 37.49.231.120 to port 80 |
2020-01-09 07:56:02 |
| 197.42.155.176 | attackbotsspam | Jan 8 22:24:24 icinga sshd[4347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.42.155.176 Jan 8 22:24:26 icinga sshd[4347]: Failed password for invalid user test from 197.42.155.176 port 29214 ssh2 ... |
2020-01-09 08:00:56 |
| 200.241.37.82 | attack | Jan 9 00:17:12 ns381471 sshd[19327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.241.37.82 Jan 9 00:17:14 ns381471 sshd[19327]: Failed password for invalid user rjp from 200.241.37.82 port 49970 ssh2 |
2020-01-09 07:30:31 |
| 197.157.219.69 | attack | Jan 8 21:48:53 pl2server sshd[31385]: Invalid user test from 197.157.219.69 Jan 8 21:48:54 pl2server sshd[31385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.157.219.69 Jan 8 21:48:55 pl2server sshd[31385]: Failed password for invalid user test from 197.157.219.69 port 40165 ssh2 Jan 8 21:48:56 pl2server sshd[31385]: Connection closed by 197.157.219.69 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=197.157.219.69 |
2020-01-09 08:07:29 |
| 222.186.175.167 | attackbots | Jan 8 23:30:56 124388 sshd[3687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Jan 8 23:30:58 124388 sshd[3687]: Failed password for root from 222.186.175.167 port 58720 ssh2 Jan 8 23:31:16 124388 sshd[3687]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 58720 ssh2 [preauth] Jan 8 23:31:20 124388 sshd[3689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Jan 8 23:31:22 124388 sshd[3689]: Failed password for root from 222.186.175.167 port 47864 ssh2 |
2020-01-09 07:32:09 |
| 103.232.121.152 | attack | Jan 8 22:08:07 srv01 proftpd[3329]: 0.0.0.0 (103.232.121.152[103.232.121.152]) - USER serverhosting: no such user found from 103.232.121.152 [103.232.121.152] to 85.114.141.118:21 Jan 8 22:08:10 srv01 proftpd[3333]: 0.0.0.0 (103.232.121.152[103.232.121.152]) - USER serverhosting: no such user found from 103.232.121.152 [103.232.121.152] to 85.114.141.118:21 Jan 8 22:08:12 srv01 proftpd[3334]: 0.0.0.0 (103.232.121.152[103.232.121.152]) - USER serverhosting: no such user found from 103.232.121.152 [103.232.121.152] to 85.114.141.118:21 ... |
2020-01-09 08:01:28 |
| 185.153.196.225 | attackbots | Jan 9 00:42:55 debian-2gb-nbg1-2 kernel: \[786288.966661\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.196.225 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=41146 PROTO=TCP SPT=53370 DPT=1004 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-09 08:05:32 |
| 223.75.33.155 | attack | Unauthorised access (Jan 8) SRC=223.75.33.155 LEN=40 TOS=0x04 TTL=51 ID=14325 TCP DPT=8080 WINDOW=1312 SYN Unauthorised access (Jan 7) SRC=223.75.33.155 LEN=40 TOS=0x04 TTL=49 ID=27587 TCP DPT=8080 WINDOW=1312 SYN Unauthorised access (Jan 6) SRC=223.75.33.155 LEN=40 TOS=0x04 TTL=49 ID=37936 TCP DPT=8080 WINDOW=1312 SYN |
2020-01-09 07:46:57 |
| 45.250.45.250 | attackspam | Unauthorised access (Jan 8) SRC=45.250.45.250 LEN=44 TTL=46 ID=7987 TCP DPT=8080 WINDOW=49873 SYN |
2020-01-09 07:38:27 |
| 104.199.33.113 | attack | Jan 9 00:02:32 vps sshd\[446\]: Invalid user default from 104.199.33.113 Jan 9 00:03:16 vps sshd\[449\]: Invalid user phion from 104.199.33.113 ... |
2020-01-09 07:33:55 |
| 200.75.4.218 | attack | 1578517715 - 01/08/2020 22:08:35 Host: 200.75.4.218/200.75.4.218 Port: 445 TCP Blocked |
2020-01-09 07:45:24 |