城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.169.205.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.169.205.114. IN A
;; AUTHORITY SECTION:
. 361 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:39:18 CST 2023
;; MSG SIZE rcvd: 108
114.205.169.106.in-addr.arpa domain name pointer KD106169205114.au-net.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.205.169.106.in-addr.arpa name = KD106169205114.au-net.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 216.218.206.120 | attackspambots | firewall-block, port(s): 4786/tcp |
2020-07-30 00:16:10 |
| 106.12.5.137 | attackspam | Failed password for invalid user bob from 106.12.5.137 port 38878 ssh2 |
2020-07-30 00:28:14 |
| 36.67.200.85 | attack | Jul 29 16:14:34 OPSO sshd\[32027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.200.85 user=root Jul 29 16:14:36 OPSO sshd\[32027\]: Failed password for root from 36.67.200.85 port 33718 ssh2 Jul 29 16:14:39 OPSO sshd\[32029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.200.85 user=root Jul 29 16:14:42 OPSO sshd\[32029\]: Failed password for root from 36.67.200.85 port 45708 ssh2 Jul 29 16:14:45 OPSO sshd\[32031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.200.85 user=root |
2020-07-30 00:12:01 |
| 218.108.191.150 | attackbotsspam | Port scanning |
2020-07-30 00:36:55 |
| 134.175.227.125 | attack | Jul 29 20:30:07 webhost01 sshd[16936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.227.125 Jul 29 20:30:09 webhost01 sshd[16936]: Failed password for invalid user linjy from 134.175.227.125 port 47046 ssh2 ... |
2020-07-30 00:16:46 |
| 91.122.193.97 | attackbots | 2020-07-29T18:03:38.410574centos sshd[4947]: Invalid user pyqt from 91.122.193.97 port 59000 2020-07-29T18:03:40.323172centos sshd[4947]: Failed password for invalid user pyqt from 91.122.193.97 port 59000 ssh2 2020-07-29T18:08:11.157419centos sshd[5202]: Invalid user dongmyeong from 91.122.193.97 port 42756 ... |
2020-07-30 00:08:25 |
| 139.59.32.156 | attack | Jul 29 16:33:49 *hidden* sshd[38444]: Failed password for invalid user lixiangpeng from 139.59.32.156 port 38066 ssh2 Jul 29 16:38:30 *hidden* sshd[49726]: Invalid user yuchen from 139.59.32.156 port 39184 Jul 29 16:38:31 *hidden* sshd[49726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.32.156 Jul 29 16:38:33 *hidden* sshd[49726]: Failed password for invalid user yuchen from 139.59.32.156 port 39184 ssh2 Jul 29 16:41:14 *hidden* sshd[56187]: Invalid user zhanghuimin from 139.59.32.156 port 46468 |
2020-07-30 00:22:07 |
| 222.186.180.8 | attack | Jul 29 18:09:53 ip106 sshd[19144]: Failed password for root from 222.186.180.8 port 43034 ssh2 Jul 29 18:09:59 ip106 sshd[19144]: Failed password for root from 222.186.180.8 port 43034 ssh2 ... |
2020-07-30 00:11:27 |
| 217.197.185.44 | attackspam | Invalid user ziyuchen from 217.197.185.44 port 42995 |
2020-07-30 00:42:48 |
| 49.88.112.69 | attack | Jul 29 18:32:17 vps sshd[82320]: Failed password for root from 49.88.112.69 port 27533 ssh2 Jul 29 18:32:19 vps sshd[82320]: Failed password for root from 49.88.112.69 port 27533 ssh2 Jul 29 18:33:45 vps sshd[87458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69 user=root Jul 29 18:33:47 vps sshd[87458]: Failed password for root from 49.88.112.69 port 18052 ssh2 Jul 29 18:33:50 vps sshd[87458]: Failed password for root from 49.88.112.69 port 18052 ssh2 ... |
2020-07-30 00:39:22 |
| 49.235.141.203 | attack | firewall-block, port(s): 21181/tcp |
2020-07-30 00:37:44 |
| 5.61.30.164 | attack | Automatic report - Banned IP Access |
2020-07-30 00:32:32 |
| 109.75.53.152 | attack | Email rejected due to spam filtering |
2020-07-29 23:55:26 |
| 198.27.66.37 | attackspambots | 2020-07-29T06:30:41.666574suse-nuc sshd[13863]: Invalid user openmeetings from 198.27.66.37 port 52656 ... |
2020-07-30 00:27:53 |
| 198.143.133.156 | attackspam | [Sat Jun 27 02:56:24 2020] - DDoS Attack From IP: 198.143.133.156 Port: 18036 |
2020-07-30 00:14:32 |