城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.14.2.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.14.2.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030800 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 17:03:00 CST 2025
;; MSG SIZE rcvd: 104
169.2.14.39.in-addr.arpa domain name pointer 39-14-2-169.adsl.fetnet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
169.2.14.39.in-addr.arpa name = 39-14-2-169.adsl.fetnet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.85.42.194 | attackspam | Nov 16 09:26:31 srv206 sshd[8599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194 user=root Nov 16 09:26:33 srv206 sshd[8599]: Failed password for root from 112.85.42.194 port 48832 ssh2 ... |
2019-11-16 17:31:58 |
| 36.112.138.185 | attackbots | 3389BruteforceFW22 |
2019-11-16 17:04:43 |
| 130.162.66.249 | attack | Nov 15 22:47:30 kapalua sshd\[23690\]: Invalid user patsourellis from 130.162.66.249 Nov 15 22:47:30 kapalua sshd\[23690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-130-162-66-249.compute.oraclecloud.com Nov 15 22:47:32 kapalua sshd\[23690\]: Failed password for invalid user patsourellis from 130.162.66.249 port 50500 ssh2 Nov 15 22:51:37 kapalua sshd\[24079\]: Invalid user 116729 from 130.162.66.249 Nov 15 22:51:37 kapalua sshd\[24079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-130-162-66-249.compute.oraclecloud.com |
2019-11-16 17:26:02 |
| 200.188.138.117 | attackbots | RDPBruteCAu |
2019-11-16 17:06:08 |
| 164.132.81.106 | attackbots | Nov 16 09:56:57 v22019058497090703 sshd[12374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106 Nov 16 09:56:59 v22019058497090703 sshd[12374]: Failed password for invalid user holeman from 164.132.81.106 port 35618 ssh2 Nov 16 10:00:12 v22019058497090703 sshd[13445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.81.106 ... |
2019-11-16 17:01:30 |
| 152.168.137.2 | attackbotsspam | Nov 16 07:55:56 root sshd[13554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2 Nov 16 07:55:58 root sshd[13554]: Failed password for invalid user menzies from 152.168.137.2 port 51039 ssh2 Nov 16 08:00:24 root sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.137.2 ... |
2019-11-16 17:16:27 |
| 77.247.110.58 | attackbotsspam | 11/16/2019-03:55:03.643846 77.247.110.58 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 75 |
2019-11-16 17:37:24 |
| 103.87.25.201 | attack | Nov 16 07:19:53 MainVPS sshd[28312]: Invalid user haigh from 103.87.25.201 port 52932 Nov 16 07:19:53 MainVPS sshd[28312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.87.25.201 Nov 16 07:19:53 MainVPS sshd[28312]: Invalid user haigh from 103.87.25.201 port 52932 Nov 16 07:19:56 MainVPS sshd[28312]: Failed password for invalid user haigh from 103.87.25.201 port 52932 ssh2 Nov 16 07:25:41 MainVPS sshd[6199]: Invalid user ssh from 103.87.25.201 port 56004 ... |
2019-11-16 17:24:17 |
| 103.74.120.201 | attack | Automatic report - Banned IP Access |
2019-11-16 17:13:21 |
| 37.187.22.227 | attackspam | Invalid user server from 37.187.22.227 port 59680 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.22.227 Failed password for invalid user server from 37.187.22.227 port 59680 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.22.227 user=root Failed password for root from 37.187.22.227 port 40716 ssh2 |
2019-11-16 17:05:25 |
| 213.39.53.241 | attackbotsspam | Nov 16 06:22:41 124388 sshd[18649]: Failed password for root from 213.39.53.241 port 38440 ssh2 Nov 16 06:25:57 124388 sshd[18831]: Invalid user akkermans from 213.39.53.241 port 47410 Nov 16 06:25:57 124388 sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.53.241 Nov 16 06:25:57 124388 sshd[18831]: Invalid user akkermans from 213.39.53.241 port 47410 Nov 16 06:26:00 124388 sshd[18831]: Failed password for invalid user akkermans from 213.39.53.241 port 47410 ssh2 |
2019-11-16 17:11:37 |
| 105.159.1.248 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/105.159.1.248/ MA - 1H : (8) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : MA NAME ASN : ASN36903 IP : 105.159.1.248 CIDR : 105.159.0.0/21 PREFIX COUNT : 843 UNIQUE IP COUNT : 1734656 ATTACKS DETECTED ASN36903 : 1H - 1 3H - 1 6H - 2 12H - 4 24H - 6 DateTime : 2019-11-16 07:25:16 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-16 17:37:58 |
| 151.73.108.190 | attackspam | Automatic report - Port Scan Attack |
2019-11-16 17:28:23 |
| 87.67.39.198 | attack | Nov 16 06:26:14 gitlab-ci sshd\[2938\]: Invalid user pi from 87.67.39.198Nov 16 06:26:14 gitlab-ci sshd\[2940\]: Invalid user pi from 87.67.39.198 ... |
2019-11-16 17:03:52 |
| 187.114.43.249 | attackbots | Unauthorised access (Nov 16) SRC=187.114.43.249 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=15184 TCP DPT=23 WINDOW=1218 SYN |
2019-11-16 17:23:25 |