城市(city): Kaunas
省份(region): Kaunas
国家(country): Lithuania
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.116.89.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.116.89.14. IN A
;; AUTHORITY SECTION:
. 147 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021122801 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 09:43:39 CST 2021
;; MSG SIZE rcvd: 105
14.89.116.89.in-addr.arpa domain name pointer 14.89.116.89.static.lrtc.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.89.116.89.in-addr.arpa name = 14.89.116.89.static.lrtc.lt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.242.83.39 | attackbots | Jun 24 02:01:32 aat-srv002 sshd[2274]: Failed password for root from 58.242.83.39 port 59138 ssh2 Jun 24 02:04:51 aat-srv002 sshd[2329]: Failed password for root from 58.242.83.39 port 35757 ssh2 Jun 24 02:06:28 aat-srv002 sshd[2346]: Failed password for root from 58.242.83.39 port 51591 ssh2 ... |
2019-06-24 15:26:34 |
| 124.113.217.113 | attackbotsspam | Bad Postfix AUTH attempts ... |
2019-06-24 15:30:53 |
| 150.95.129.150 | attackspambots | 2019-06-24T07:20:39.876870abusebot-5.cloudsearch.cf sshd\[10226\]: Invalid user git-user from 150.95.129.150 port 40236 |
2019-06-24 15:45:13 |
| 103.18.4.8 | attackspambots | Jun 24 08:14:39 cloud sshd[1234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.18.4.8 Jun 24 08:14:41 cloud sshd[1234]: Failed password for invalid user gc from 103.18.4.8 port 43445 ssh2 |
2019-06-24 16:01:19 |
| 192.144.184.199 | attackbots | Automatic report - Web App Attack |
2019-06-24 15:24:38 |
| 191.232.183.73 | attack | Jun 23 18:35:10 warning: unknown[191.232.183.73]: SASL LOGIN authentication failed: authentication failure Jun 23 18:35:11 warning: unknown[191.232.183.73]: SASL LOGIN authentication failed: authentication failure Jun 23 18:35:12 warning: unknown[191.232.183.73]: SASL LOGIN authentication failed: authentication failure |
2019-06-24 16:03:24 |
| 82.48.96.98 | attack | Jun 24 06:44:44 own sshd[6126]: Invalid user admin from 82.48.96.98 Jun 24 06:44:44 own sshd[6126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.48.96.98 Jun 24 06:44:46 own sshd[6126]: Failed password for invalid user admin from 82.48.96.98 port 46109 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=82.48.96.98 |
2019-06-24 16:02:18 |
| 157.55.39.204 | attackspam | Automatic report - Web App Attack |
2019-06-24 15:33:31 |
| 58.242.82.11 | attackbots | Jun 24 09:20:38 ubuntu-2gb-nbg1-dc3-1 sshd[32637]: Failed password for root from 58.242.82.11 port 7530 ssh2 Jun 24 09:20:49 ubuntu-2gb-nbg1-dc3-1 sshd[32637]: error: maximum authentication attempts exceeded for root from 58.242.82.11 port 7530 ssh2 [preauth] ... |
2019-06-24 15:26:06 |
| 142.252.248.114 | attack | [Mon Jun 24 06:53:13.012562 2019] [php5:error] [pid 27860] [client 142.252.248.114:44672] script '/data/web/construction/Appe6e356d9.php' not found or unable to stat [Mon Jun 24 06:53:14.532758 2019] [php5:error] [pid 22889] [client 142.252.248.114:45812] script '/data/web/construction/help.php' not found or unable to stat [Mon Jun 24 06:53:15.275347 2019] [php5:error] [pid 23998] [client 142.252.248.114:46122] script '/data/web/construction/java.php' not found or unable to stat |
2019-06-24 15:58:40 |
| 176.58.127.68 | attackbotsspam | " " |
2019-06-24 15:43:23 |
| 221.151.188.200 | attack | Jun 24 07:33:53 ns341937 sshd[25260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.151.188.200 Jun 24 07:33:54 ns341937 sshd[25260]: Failed password for invalid user support from 221.151.188.200 port 34188 ssh2 Jun 24 07:33:56 ns341937 sshd[25262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.151.188.200 ... |
2019-06-24 15:59:50 |
| 191.243.1.223 | attackspambots | Jun 24 05:58:35 xm3 sshd[15228]: reveeclipse mapping checking getaddrinfo for 223.1.243.191-bgp.giganetmg.com.br [191.243.1.223] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 24 05:58:37 xm3 sshd[15228]: Failed password for invalid user vncuser from 191.243.1.223 port 34510 ssh2 Jun 24 05:58:37 xm3 sshd[15228]: Received disconnect from 191.243.1.223: 11: Bye Bye [preauth] Jun 24 06:01:36 xm3 sshd[22264]: reveeclipse mapping checking getaddrinfo for 223.1.243.191-bgp.giganetmg.com.br [191.243.1.223] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 24 06:01:38 xm3 sshd[22264]: Failed password for invalid user suel from 191.243.1.223 port 45987 ssh2 Jun 24 06:01:39 xm3 sshd[22264]: Received disconnect from 191.243.1.223: 11: Bye Bye [preauth] Jun 24 06:03:47 xm3 sshd[25269]: reveeclipse mapping checking getaddrinfo for 223.1.243.191-bgp.giganetmg.com.br [191.243.1.223] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 24 06:03:48 xm3 sshd[25269]: Failed password for invalid user weblogic from 191......... ------------------------------- |
2019-06-24 15:33:50 |
| 218.92.0.196 | attackspambots | Jun 24 06:51:23 * sshd[19357]: Failed password for root from 218.92.0.196 port 16700 ssh2 |
2019-06-24 15:37:48 |
| 185.182.56.168 | attackspam | WP Authentication failure |
2019-06-24 15:32:46 |