城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.109.196.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.109.196.10. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 176 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:22:59 CST 2025
;; MSG SIZE rcvd: 107
10.196.109.114.in-addr.arpa domain name pointer cm-114-109-196-10.revip13.asianet.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
10.196.109.114.in-addr.arpa name = cm-114-109-196-10.revip13.asianet.co.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.125.66.66 | attackspam | \[2019-11-07 12:01:43\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T12:01:43.061-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="5748501148627490017",SessionID="0x7fdf2c614b28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.66/51499",ACLName="no_extension_match" \[2019-11-07 12:01:50\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T12:01:50.483-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="5083101148957156001",SessionID="0x7fdf2cae1298",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.66/59740",ACLName="no_extension_match" \[2019-11-07 12:02:13\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T12:02:13.336-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="5413901148757329001",SessionID="0x7fdf2c19f8b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.66/53921",ACLNam |
2019-11-08 01:07:36 |
| 191.254.143.24 | attackspambots | Unauthorized connection attempt from IP address 191.254.143.24 on Port 445(SMB) |
2019-11-08 01:08:04 |
| 202.62.111.174 | attackspam | Unauthorized connection attempt from IP address 202.62.111.174 on Port 445(SMB) |
2019-11-08 00:54:25 |
| 59.13.139.46 | attack | Nov 7 17:05:25 XXX sshd[3218]: Invalid user ofsaa from 59.13.139.46 port 58350 |
2019-11-08 01:05:24 |
| 111.230.19.43 | attack | Nov 7 18:51:03 site3 sshd\[53905\]: Invalid user ubnt from 111.230.19.43 Nov 7 18:51:03 site3 sshd\[53905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.19.43 Nov 7 18:51:05 site3 sshd\[53905\]: Failed password for invalid user ubnt from 111.230.19.43 port 59424 ssh2 Nov 7 18:57:58 site3 sshd\[53983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.19.43 user=root Nov 7 18:58:00 site3 sshd\[53983\]: Failed password for root from 111.230.19.43 port 38982 ssh2 ... |
2019-11-08 01:03:28 |
| 202.125.145.55 | attackspambots | Unauthorized connection attempt from IP address 202.125.145.55 on Port 445(SMB) |
2019-11-08 01:14:11 |
| 157.230.243.22 | attackbots | Bot ignores robot.txt restrictions |
2019-11-08 00:55:02 |
| 178.128.107.117 | attack | Nov 7 17:47:26 meumeu sshd[12001]: Failed password for root from 178.128.107.117 port 58972 ssh2 Nov 7 17:51:24 meumeu sshd[12608]: Failed password for root from 178.128.107.117 port 38004 ssh2 ... |
2019-11-08 01:02:20 |
| 176.99.124.32 | attackbots | Unauthorized connection attempt from IP address 176.99.124.32 on Port 445(SMB) |
2019-11-08 01:16:20 |
| 50.253.12.212 | attackbots | RDP Bruteforce |
2019-11-08 01:11:58 |
| 72.46.80.254 | attackspambots | Automatic report - Port Scan Attack |
2019-11-08 01:18:56 |
| 36.92.195.219 | attackspambots | Unauthorized connection attempt from IP address 36.92.195.219 on Port 445(SMB) |
2019-11-08 01:19:25 |
| 181.118.206.48 | attackbots | Unauthorized connection attempt from IP address 181.118.206.48 on Port 445(SMB) |
2019-11-08 01:18:10 |
| 2804:5d4:1:101a:f816:3eff:fee0:a645 | attackspambots | Automatically reported by fail2ban report script (mx1) |
2019-11-08 01:01:34 |
| 142.93.61.255 | attackbotsspam | 2019-11-07T15:56:19.002825shield sshd\[24352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.61.255 user=root 2019-11-07T15:56:20.808719shield sshd\[24352\]: Failed password for root from 142.93.61.255 port 48392 ssh2 2019-11-07T15:59:55.948737shield sshd\[24843\]: Invalid user wpyan from 142.93.61.255 port 57854 2019-11-07T15:59:55.953859shield sshd\[24843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.61.255 2019-11-07T15:59:57.884912shield sshd\[24843\]: Failed password for invalid user wpyan from 142.93.61.255 port 57854 ssh2 |
2019-11-08 01:28:26 |