城市(city): Bogotá
省份(region): Bogota D.C.
国家(country): Colombia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.14.42.179
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;23.14.42.179. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:25:25 CST 2025
;; MSG SIZE rcvd: 105
179.42.14.23.in-addr.arpa domain name pointer a23-14-42-179.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
179.42.14.23.in-addr.arpa name = a23-14-42-179.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 217.182.70.150 | attack | Apr 8 07:15:46 v22019038103785759 sshd\[2798\]: Invalid user oracle from 217.182.70.150 port 43056 Apr 8 07:15:46 v22019038103785759 sshd\[2798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.150 Apr 8 07:15:48 v22019038103785759 sshd\[2798\]: Failed password for invalid user oracle from 217.182.70.150 port 43056 ssh2 Apr 8 07:20:32 v22019038103785759 sshd\[3173\]: Invalid user cs from 217.182.70.150 port 55754 Apr 8 07:20:32 v22019038103785759 sshd\[3173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.150 ... |
2020-04-08 14:56:51 |
| 211.254.212.241 | attackspambots | Apr 8 09:20:20 server sshd\[16290\]: Invalid user hernando from 211.254.212.241 Apr 8 09:20:20 server sshd\[16290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.212.241 Apr 8 09:20:21 server sshd\[16290\]: Failed password for invalid user hernando from 211.254.212.241 port 23683 ssh2 Apr 8 09:22:13 server sshd\[16506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.212.241 user=root Apr 8 09:22:15 server sshd\[16506\]: Failed password for root from 211.254.212.241 port 34977 ssh2 ... |
2020-04-08 14:27:53 |
| 217.55.148.113 | attackbotsspam | DATE:2020-04-08 05:57:43, IP:217.55.148.113, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-04-08 14:47:36 |
| 49.88.112.118 | attackspam | Apr 8 08:01:57 * sshd[22337]: Failed password for root from 49.88.112.118 port 52102 ssh2 |
2020-04-08 14:57:40 |
| 49.88.112.66 | attackbots | 2020-04-08T06:21:24.528774shield sshd\[30323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66 user=root 2020-04-08T06:21:26.168863shield sshd\[30323\]: Failed password for root from 49.88.112.66 port 51429 ssh2 2020-04-08T06:21:28.312501shield sshd\[30323\]: Failed password for root from 49.88.112.66 port 51429 ssh2 2020-04-08T06:21:31.065050shield sshd\[30323\]: Failed password for root from 49.88.112.66 port 51429 ssh2 2020-04-08T06:21:50.969506shield sshd\[30386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66 user=root |
2020-04-08 14:33:34 |
| 49.88.112.65 | attackbotsspam | Apr 8 04:57:37 pi sshd[24588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root Apr 8 04:57:39 pi sshd[24588]: Failed password for invalid user root from 49.88.112.65 port 34977 ssh2 |
2020-04-08 14:51:59 |
| 104.192.82.99 | attack | Apr 7 20:09:28 php1 sshd\[7020\]: Invalid user gpadmin from 104.192.82.99 Apr 7 20:09:28 php1 sshd\[7020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.192.82.99 Apr 7 20:09:30 php1 sshd\[7020\]: Failed password for invalid user gpadmin from 104.192.82.99 port 55974 ssh2 Apr 7 20:15:03 php1 sshd\[7560\]: Invalid user admin1 from 104.192.82.99 Apr 7 20:15:03 php1 sshd\[7560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.192.82.99 |
2020-04-08 14:36:27 |
| 112.85.42.237 | attackspambots | Apr 8 02:46:18 NPSTNNYC01T sshd[24889]: Failed password for root from 112.85.42.237 port 56823 ssh2 Apr 8 02:53:03 NPSTNNYC01T sshd[25196]: Failed password for root from 112.85.42.237 port 52681 ssh2 Apr 8 02:53:06 NPSTNNYC01T sshd[25196]: Failed password for root from 112.85.42.237 port 52681 ssh2 ... |
2020-04-08 14:54:42 |
| 49.235.91.59 | attackspam | Automatic report - SSH Brute-Force Attack |
2020-04-08 14:51:22 |
| 91.225.77.52 | attackspam | Apr 8 08:43:09 server sshd\[7946\]: Invalid user ubuntu from 91.225.77.52 Apr 8 08:43:09 server sshd\[7946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.77.52 Apr 8 08:43:12 server sshd\[7946\]: Failed password for invalid user ubuntu from 91.225.77.52 port 50664 ssh2 Apr 8 08:45:17 server sshd\[8676\]: Invalid user ts3bot from 91.225.77.52 Apr 8 08:45:17 server sshd\[8676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.77.52 ... |
2020-04-08 15:08:37 |
| 51.83.75.97 | attackspambots | Wordpress malicious attack:[sshd] |
2020-04-08 14:33:11 |
| 107.175.151.141 | attack | (mod_security) mod_security (id:210740) triggered by 107.175.151.141 (US/United States/107-175-151-141-host.colocrossing.com): 5 in the last 300 secs |
2020-04-08 15:08:02 |
| 54.39.22.191 | attackbots | 2020-04-08T07:13:06.805971struts4.enskede.local sshd\[23132\]: Invalid user lia from 54.39.22.191 port 33744 2020-04-08T07:13:06.813492struts4.enskede.local sshd\[23132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.22.191 2020-04-08T07:13:09.395019struts4.enskede.local sshd\[23132\]: Failed password for invalid user lia from 54.39.22.191 port 33744 ssh2 2020-04-08T07:18:29.220631struts4.enskede.local sshd\[23286\]: Invalid user user from 54.39.22.191 port 57608 2020-04-08T07:18:29.227274struts4.enskede.local sshd\[23286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.22.191 ... |
2020-04-08 14:35:09 |
| 218.255.86.106 | attackbots | Apr 7 05:29:55 myhostname sshd[11756]: Invalid user etri from 218.255.86.106 Apr 7 05:29:55 myhostname sshd[11756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.86.106 Apr 7 05:29:57 myhostname sshd[11756]: Failed password for invalid user etri from 218.255.86.106 port 50517 ssh2 Apr 7 05:29:58 myhostname sshd[11756]: Received disconnect from 218.255.86.106 port 50517:11: Bye Bye [preauth] Apr 7 05:29:58 myhostname sshd[11756]: Disconnected from 218.255.86.106 port 50517 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=218.255.86.106 |
2020-04-08 14:37:53 |
| 54.38.190.48 | attackbotsspam | fail2ban |
2020-04-08 15:02:56 |