城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.48.14.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.48.14.230. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 176 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 11:38:59 CST 2025
;; MSG SIZE rcvd: 105
230.14.48.67.in-addr.arpa domain name pointer syn-067-048-014-230.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
230.14.48.67.in-addr.arpa name = syn-067-048-014-230.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 120.50.44.6 | attack | From qiblixcuye@onlinedatacab.com Fri Aug 14 00:36:13 2020 Received: from [120.50.44.6] (port=60414 helo=6.44.50.120.static.idc.qala.com.sg) |
2020-08-14 16:55:23 |
| 1.179.185.50 | attackspambots | Aug 13 23:46:00 pixelmemory sshd[620196]: Failed password for root from 1.179.185.50 port 33794 ssh2 Aug 13 23:49:04 pixelmemory sshd[620772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50 user=root Aug 13 23:49:07 pixelmemory sshd[620772]: Failed password for root from 1.179.185.50 port 50762 ssh2 Aug 13 23:52:04 pixelmemory sshd[621259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50 user=root Aug 13 23:52:06 pixelmemory sshd[621259]: Failed password for root from 1.179.185.50 port 39490 ssh2 ... |
2020-08-14 17:18:49 |
| 178.128.214.141 | attackspambots |
|
2020-08-14 17:12:22 |
| 192.35.168.219 | attackbots | Unauthorized connection attempt detected from IP address 192.35.168.219 to port 82 [T] |
2020-08-14 17:13:37 |
| 209.97.128.229 | attackbots | detected by Fail2Ban |
2020-08-14 17:22:37 |
| 182.61.6.64 | attackbots | 2020-08-14T11:17:59.112928+02:00 |
2020-08-14 17:27:33 |
| 106.13.197.159 | attack | Aug 14 03:35:55 *** sshd[24391]: User root from 106.13.197.159 not allowed because not listed in AllowUsers |
2020-08-14 17:11:01 |
| 112.85.42.186 | attackbotsspam | Aug 14 11:01:25 PorscheCustomer sshd[8431]: Failed password for root from 112.85.42.186 port 46257 ssh2 Aug 14 11:02:30 PorscheCustomer sshd[8450]: Failed password for root from 112.85.42.186 port 11507 ssh2 ... |
2020-08-14 17:10:46 |
| 61.177.172.54 | attack | Aug 14 10:35:30 PorscheCustomer sshd[7945]: Failed password for root from 61.177.172.54 port 26223 ssh2 Aug 14 10:35:44 PorscheCustomer sshd[7945]: error: maximum authentication attempts exceeded for root from 61.177.172.54 port 26223 ssh2 [preauth] Aug 14 10:35:52 PorscheCustomer sshd[7958]: Failed password for root from 61.177.172.54 port 53812 ssh2 ... |
2020-08-14 16:49:50 |
| 189.126.187.137 | attackbotsspam | Brute force attempt |
2020-08-14 16:56:01 |
| 36.84.84.26 | attackbots | 20/8/14@01:48:02: FAIL: Alarm-Network address from=36.84.84.26 20/8/14@01:48:02: FAIL: Alarm-Network address from=36.84.84.26 ... |
2020-08-14 17:25:58 |
| 49.234.27.90 | attackspambots | <6 unauthorized SSH connections |
2020-08-14 17:21:42 |
| 185.67.82.114 | attackbots | SSH brute-force attempt |
2020-08-14 16:48:30 |
| 140.143.233.133 | attackbots | Aug 14 05:35:57 mout sshd[24361]: Invalid user 8888888888 from 140.143.233.133 port 50516 |
2020-08-14 17:09:00 |
| 37.123.163.106 | attackspambots | 2020-08-14T07:53:21.652209n23.at sshd[1170228]: Failed password for root from 37.123.163.106 port 11736 ssh2 2020-08-14T07:57:10.403310n23.at sshd[1173267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106 user=root 2020-08-14T07:57:11.646961n23.at sshd[1173267]: Failed password for root from 37.123.163.106 port 11736 ssh2 ... |
2020-08-14 17:23:14 |