城市(city): unknown
省份(region): unknown
国家(country): Cyprus
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.214.239.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.214.239.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:16:57 CST 2025
;; MSG SIZE rcvd: 106
14.239.214.91.in-addr.arpa domain name pointer ip-91-214-239-14.gadu-gadu.pl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.239.214.91.in-addr.arpa name = ip-91-214-239-14.gadu-gadu.pl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.85.42.188 | attackbotsspam | 05/31/2020-18:30:56.265861 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-06-01 06:32:16 |
| 193.204.163.219 | attack | May 31 04:11:45 pl3server sshd[17437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.204.163.219 user=r.r May 31 04:11:48 pl3server sshd[17437]: Failed password for r.r from 193.204.163.219 port 35466 ssh2 May 31 04:11:48 pl3server sshd[17437]: Received disconnect from 193.204.163.219 port 35466:11: Bye Bye [preauth] May 31 04:11:48 pl3server sshd[17437]: Disconnected from 193.204.163.219 port 35466 [preauth] May 31 04:23:47 pl3server sshd[9127]: Invalid user guest from 193.204.163.219 port 50274 May 31 04:23:47 pl3server sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.204.163.219 May 31 04:23:49 pl3server sshd[9127]: Failed password for invalid user guest from 193.204.163.219 port 50274 ssh2 May 31 04:23:49 pl3server sshd[9127]: Received disconnect from 193.204.163.219 port 50274:11: Bye Bye [preauth] May 31 04:23:49 pl3server sshd[9127]: Disconnected from 193.204.163........ ------------------------------- |
2020-06-01 06:26:21 |
| 167.99.66.158 | attack | May 31 20:24:21 *** sshd[14706]: User root from 167.99.66.158 not allowed because not listed in AllowUsers |
2020-06-01 06:48:41 |
| 182.61.46.245 | attackspam | Jun 1 03:16:21 itv-usvr-01 sshd[21949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.245 user=root Jun 1 03:16:22 itv-usvr-01 sshd[21949]: Failed password for root from 182.61.46.245 port 44884 ssh2 Jun 1 03:24:44 itv-usvr-01 sshd[22299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.245 user=root Jun 1 03:24:47 itv-usvr-01 sshd[22299]: Failed password for root from 182.61.46.245 port 39786 ssh2 |
2020-06-01 06:31:11 |
| 118.101.192.81 | attackbotsspam | Jun 1 00:33:00 nextcloud sshd\[13719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.81 user=root Jun 1 00:33:02 nextcloud sshd\[13719\]: Failed password for root from 118.101.192.81 port 41840 ssh2 Jun 1 00:41:27 nextcloud sshd\[25783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.81 user=root |
2020-06-01 06:46:33 |
| 124.205.139.75 | attack | (pop3d) Failed POP3 login from 124.205.139.75 (CN/China/-): 10 in the last 3600 secs |
2020-06-01 06:22:41 |
| 177.126.24.14 | attackspambots | May 31 06:10:03 vps34202 sshd[28324]: reveeclipse mapping checking getaddrinfo for 14.24.126.177.3dtelecomunicacoes.com.br [177.126.24.14] failed - POSSIBLE BREAK-IN ATTEMPT! May 31 06:10:03 vps34202 sshd[28324]: Invalid user windows from 177.126.24.14 May 31 06:10:03 vps34202 sshd[28324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.24.14 May 31 06:10:04 vps34202 sshd[28324]: Failed password for invalid user windows from 177.126.24.14 port 43957 ssh2 May 31 06:10:05 vps34202 sshd[28324]: Received disconnect from 177.126.24.14: 11: Bye Bye [preauth] May 31 06:13:10 vps34202 sshd[28407]: reveeclipse mapping checking getaddrinfo for 14.24.126.177.3dtelecomunicacoes.com.br [177.126.24.14] failed - POSSIBLE BREAK-IN ATTEMPT! May 31 06:13:10 vps34202 sshd[28407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.24.14 user=r.r May 31 06:13:12 vps34202 sshd[28407]: Failed passwo........ ------------------------------- |
2020-06-01 06:31:40 |
| 116.196.90.116 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-06-01 06:22:53 |
| 52.15.245.63 | attackbotsspam | May 30 23:32:13 kmh-wmh-003-nbg03 sshd[18227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.15.245.63 user=r.r May 30 23:32:16 kmh-wmh-003-nbg03 sshd[18227]: Failed password for r.r from 52.15.245.63 port 51956 ssh2 May 30 23:32:16 kmh-wmh-003-nbg03 sshd[18227]: Received disconnect from 52.15.245.63 port 51956:11: Bye Bye [preauth] May 30 23:32:16 kmh-wmh-003-nbg03 sshd[18227]: Disconnected from 52.15.245.63 port 51956 [preauth] May 31 00:51:37 kmh-wmh-003-nbg03 sshd[2765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.15.245.63 user=r.r May 31 00:51:39 kmh-wmh-003-nbg03 sshd[2765]: Failed password for r.r from 52.15.245.63 port 56992 ssh2 May 31 00:51:39 kmh-wmh-003-nbg03 sshd[2765]: Received disconnect from 52.15.245.63 port 56992:11: Bye Bye [preauth] May 31 00:51:39 kmh-wmh-003-nbg03 sshd[2765]: Disconnected from 52.15.245.63 port 56992 [preauth] May 31 00:54:09 kmh-wmh-003-........ ------------------------------- |
2020-06-01 06:08:25 |
| 130.0.25.110 | attack | Automatic report - XMLRPC Attack |
2020-06-01 06:47:40 |
| 191.239.243.123 | attackspam | Invalid user webler from 191.239.243.123 port 60926 |
2020-06-01 06:44:19 |
| 210.245.110.9 | attackbotsspam | Failed password for root from 210.245.110.9 port 64733 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.110.9 user=root Failed password for root from 210.245.110.9 port 42965 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.110.9 user=root Failed password for root from 210.245.110.9 port 49429 ssh2 |
2020-06-01 06:34:59 |
| 200.44.50.155 | attack | Jun 1 00:27:30 nextcloud sshd\[5950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155 user=root Jun 1 00:27:32 nextcloud sshd\[5950\]: Failed password for root from 200.44.50.155 port 44706 ssh2 Jun 1 00:29:07 nextcloud sshd\[8272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155 user=root |
2020-06-01 06:49:08 |
| 113.204.205.66 | attackbotsspam | May 31 18:02:30 NPSTNNYC01T sshd[5274]: Failed password for root from 113.204.205.66 port 60783 ssh2 May 31 18:05:56 NPSTNNYC01T sshd[5628]: Failed password for root from 113.204.205.66 port 14630 ssh2 ... |
2020-06-01 06:15:55 |
| 122.181.217.215 | attack | Lines containing failures of 122.181.217.215 May 31 07:54:54 keyhelp sshd[14473]: Invalid user pi from 122.181.217.215 port 33878 May 31 07:54:54 keyhelp sshd[14473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.181.217.215 May 31 07:54:54 keyhelp sshd[14477]: Invalid user pi from 122.181.217.215 port 33884 May 31 07:54:54 keyhelp sshd[14477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.181.217.215 May 31 07:54:56 keyhelp sshd[14473]: Failed password for invalid user pi from 122.181.217.215 port 33878 ssh2 May 31 07:54:56 keyhelp sshd[14473]: Connection closed by invalid user pi 122.181.217.215 port 33878 [preauth] May 31 07:54:56 keyhelp sshd[14477]: Failed password for invalid user pi from 122.181.217.215 port 33884 ssh2 May 31 07:54:56 keyhelp sshd[14477]: Connection closed by invalid user pi 122.181.217.215 port 33884 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/e |
2020-06-01 06:37:58 |