城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.113.13.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.113.13.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:41:28 CST 2025
;; MSG SIZE rcvd: 105
b'Host 214.13.113.6.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 6.113.13.214.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.99.32.86 | attack | Failed password for invalid user ubuntu from 192.99.32.86 port 57340 ssh2 Invalid user webadmin from 192.99.32.86 port 39408 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.32.86 Failed password for invalid user webadmin from 192.99.32.86 port 39408 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.32.86 user=root |
2019-10-28 19:17:28 |
| 198.13.134.46 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/198.13.134.46/ US - 1H : (295) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN19397 IP : 198.13.134.46 CIDR : 198.13.128.0/19 PREFIX COUNT : 133 UNIQUE IP COUNT : 181248 ATTACKS DETECTED ASN19397 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-28 04:45:31 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-28 19:21:18 |
| 118.27.32.93 | attack | SSH/22 MH Probe, BF, Hack - |
2019-10-28 19:50:29 |
| 94.23.165.68 | attack | Unauthorized connection attempt from IP address 94.23.165.68 on Port 3389(RDP) |
2019-10-28 19:35:12 |
| 178.128.223.243 | attackbots | 2019-10-17T16:35:41.220459ns525875 sshd\[11462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243 user=root 2019-10-17T16:35:42.774634ns525875 sshd\[11462\]: Failed password for root from 178.128.223.243 port 58052 ssh2 2019-10-17T16:39:43.974810ns525875 sshd\[16621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243 user=root 2019-10-17T16:39:46.086124ns525875 sshd\[16621\]: Failed password for root from 178.128.223.243 port 40934 ssh2 2019-10-17T16:43:44.594881ns525875 sshd\[21540\]: Invalid user dev from 178.128.223.243 port 52056 2019-10-17T16:43:44.601081ns525875 sshd\[21540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243 2019-10-17T16:43:46.797632ns525875 sshd\[21540\]: Failed password for invalid user dev from 178.128.223.243 port 52056 ssh2 2019-10-17T16:47:37.081051ns525875 sshd\[26237\]: Invalid us ... |
2019-10-28 19:36:50 |
| 119.27.189.46 | attackspambots | Oct 27 19:25:14 tdfoods sshd\[29720\]: Invalid user password1234 from 119.27.189.46 Oct 27 19:25:14 tdfoods sshd\[29720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.46 Oct 27 19:25:16 tdfoods sshd\[29720\]: Failed password for invalid user password1234 from 119.27.189.46 port 39340 ssh2 Oct 27 19:30:28 tdfoods sshd\[30168\]: Invalid user 123456 from 119.27.189.46 Oct 27 19:30:28 tdfoods sshd\[30168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.46 |
2019-10-28 19:29:02 |
| 95.213.129.164 | attack | firewall-block, port(s): 3396/tcp |
2019-10-28 19:47:50 |
| 148.70.56.123 | attackbotsspam | Oct 28 07:57:07 localhost sshd\[20188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.56.123 user=root Oct 28 07:57:10 localhost sshd\[20188\]: Failed password for root from 148.70.56.123 port 33186 ssh2 Oct 28 08:22:56 localhost sshd\[20522\]: Invalid user delphine from 148.70.56.123 port 60922 ... |
2019-10-28 19:27:29 |
| 170.150.155.102 | attack | SSH invalid-user multiple login try |
2019-10-28 19:46:56 |
| 217.68.216.41 | attackbots | slow and persistent scanner |
2019-10-28 19:55:35 |
| 165.227.157.168 | attackbots | Oct 28 06:39:18 server sshd\[11114\]: Invalid user kafka from 165.227.157.168 port 43018 Oct 28 06:39:18 server sshd\[11114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168 Oct 28 06:39:20 server sshd\[11114\]: Failed password for invalid user kafka from 165.227.157.168 port 43018 ssh2 Oct 28 06:43:11 server sshd\[14323\]: User root from 165.227.157.168 not allowed because listed in DenyUsers Oct 28 06:43:11 server sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168 user=root |
2019-10-28 19:18:35 |
| 35.185.45.244 | attackbotsspam | invalid user |
2019-10-28 19:37:42 |
| 113.234.37.13 | attack | Unauthorised access (Oct 28) SRC=113.234.37.13 LEN=40 TTL=49 ID=61719 TCP DPT=8080 WINDOW=3273 SYN Unauthorised access (Oct 27) SRC=113.234.37.13 LEN=40 TTL=49 ID=25769 TCP DPT=8080 WINDOW=3273 SYN |
2019-10-28 19:32:29 |
| 193.32.160.150 | attack | 2019-10-28 H=\(\[193.32.160.150\]\) \[193.32.160.150\] F=\ |
2019-10-28 19:55:52 |
| 81.169.219.115 | attackspam | Received: from saki-gmbh.de (saki-gmbh.de [81.169.219.115]) |
2019-10-28 19:30:46 |