城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.109.139.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.109.139.74. IN A
;; AUTHORITY SECTION:
. 438 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019103001 1800 900 604800 86400
;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 10:28:07 CST 2019
;; MSG SIZE rcvd: 118
74.139.109.114.in-addr.arpa domain name pointer cm-114-109-139-74.revip13.asianet.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.139.109.114.in-addr.arpa name = cm-114-109-139-74.revip13.asianet.co.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.57.227.12 | attackspam | Jul 23 15:59:43 gospond sshd[29592]: Invalid user py from 62.57.227.12 port 36846 Jul 23 15:59:44 gospond sshd[29592]: Failed password for invalid user py from 62.57.227.12 port 36846 ssh2 Jul 23 16:04:01 gospond sshd[29677]: Invalid user alberto from 62.57.227.12 port 50846 ... |
2020-07-24 00:12:12 |
| 177.254.20.239 | attackspambots | Unauthorized connection attempt from IP address 177.254.20.239 on Port 445(SMB) |
2020-07-23 23:49:39 |
| 49.234.145.177 | attackbots | SSH brute force attempt |
2020-07-23 23:42:24 |
| 124.239.148.63 | attackbotsspam | 2020-07-23T13:59:04.290297abusebot-6.cloudsearch.cf sshd[32543]: Invalid user www from 124.239.148.63 port 49205 2020-07-23T13:59:04.294630abusebot-6.cloudsearch.cf sshd[32543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63 2020-07-23T13:59:04.290297abusebot-6.cloudsearch.cf sshd[32543]: Invalid user www from 124.239.148.63 port 49205 2020-07-23T13:59:06.193822abusebot-6.cloudsearch.cf sshd[32543]: Failed password for invalid user www from 124.239.148.63 port 49205 ssh2 2020-07-23T14:08:41.752637abusebot-6.cloudsearch.cf sshd[32669]: Invalid user claire from 124.239.148.63 port 27123 2020-07-23T14:08:41.759592abusebot-6.cloudsearch.cf sshd[32669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.148.63 2020-07-23T14:08:41.752637abusebot-6.cloudsearch.cf sshd[32669]: Invalid user claire from 124.239.148.63 port 27123 2020-07-23T14:08:43.869590abusebot-6.cloudsearch.cf sshd[32669]: Fai ... |
2020-07-23 23:53:53 |
| 37.187.113.144 | attack | 2020-07-23T16:45:24.622557ns386461 sshd\[8515\]: Invalid user dispatch from 37.187.113.144 port 53044 2020-07-23T16:45:24.627496ns386461 sshd\[8515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dedi-max.ovh 2020-07-23T16:45:26.838364ns386461 sshd\[8515\]: Failed password for invalid user dispatch from 37.187.113.144 port 53044 ssh2 2020-07-23T16:55:11.030318ns386461 sshd\[16965\]: Invalid user perez from 37.187.113.144 port 48192 2020-07-23T16:55:11.034949ns386461 sshd\[16965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dedi-max.ovh ... |
2020-07-24 00:19:40 |
| 36.46.142.80 | attackbots | 2020-07-23T13:55:47.016923amanda2.illicoweb.com sshd\[1274\]: Invalid user low from 36.46.142.80 port 45901 2020-07-23T13:55:47.022263amanda2.illicoweb.com sshd\[1274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.46.142.80 2020-07-23T13:55:48.440702amanda2.illicoweb.com sshd\[1274\]: Failed password for invalid user low from 36.46.142.80 port 45901 ssh2 2020-07-23T14:00:33.525186amanda2.illicoweb.com sshd\[1427\]: Invalid user chiudi from 36.46.142.80 port 47724 2020-07-23T14:00:33.530438amanda2.illicoweb.com sshd\[1427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.46.142.80 ... |
2020-07-24 00:21:22 |
| 5.101.44.68 | attackbots | abuse, hacking, fraud, spamming, scammer |
2020-07-23 23:33:30 |
| 78.188.15.227 | attack | Port probing on unauthorized port 23 |
2020-07-24 00:07:39 |
| 188.170.236.10 | attackbotsspam | Unauthorized connection attempt from IP address 188.170.236.10 on Port 445(SMB) |
2020-07-24 00:11:38 |
| 188.162.194.229 | attack | 1595505677 - 07/23/2020 14:01:17 Host: 188.162.194.229/188.162.194.229 Port: 445 TCP Blocked |
2020-07-23 23:32:18 |
| 84.39.254.28 | attackbotsspam | Unauthorized connection attempt from IP address 84.39.254.28 on Port 445(SMB) |
2020-07-23 23:38:25 |
| 220.134.23.42 | attackspam | Unauthorized connection attempt from IP address 220.134.23.42 on Port 445(SMB) |
2020-07-23 23:44:30 |
| 158.181.184.35 | attack | 1595505650 - 07/23/2020 14:00:50 Host: 158.181.184.35/158.181.184.35 Port: 445 TCP Blocked |
2020-07-23 23:59:06 |
| 118.70.169.8 | attackspambots | Unauthorized connection attempt from IP address 118.70.169.8 on Port 445(SMB) |
2020-07-23 23:43:46 |
| 23.236.213.213 | attack | Tente de se connecter sur plusieurs compte de personne |
2020-07-23 23:59:40 |