城市(city): Iida
省份(region): Nagano
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): NTT Communications Corporation
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.146.140.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41317
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.146.140.127. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019081601 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 17 05:05:32 CST 2019
;; MSG SIZE rcvd: 119
127.140.146.114.in-addr.arpa domain name pointer p2511128-ipoe.ipoe.ocn.ne.jp.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
127.140.146.114.in-addr.arpa name = p2511128-ipoe.ipoe.ocn.ne.jp.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
50.206.22.121 | attackbots | tcp 1433 ms-sql |
2019-12-13 05:46:49 |
5.133.66.10 | attackspam | Autoban 5.133.66.10 AUTH/CONNECT |
2019-12-13 05:29:27 |
5.133.66.108 | attack | Autoban 5.133.66.108 AUTH/CONNECT |
2019-12-13 05:26:48 |
46.40.56.88 | attackspambots | Autoban 46.40.56.88 AUTH/CONNECT |
2019-12-13 05:41:40 |
49.0.32.218 | attackspambots | Autoban 49.0.32.218 AUTH/CONNECT |
2019-12-13 05:37:18 |
49.49.212.222 | attack | Autoban 49.49.212.222 AUTH/CONNECT |
2019-12-13 05:30:58 |
47.61.26.112 | attack | Autoban 47.61.26.112 AUTH/CONNECT |
2019-12-13 05:39:44 |
46.215.207.89 | attackspambots | Autoban 46.215.207.89 AUTH/CONNECT |
2019-12-13 05:50:12 |
222.186.175.154 | attack | Dec 12 22:00:23 mail sshd[5288]: Failed password for root from 222.186.175.154 port 29316 ssh2 Dec 12 22:00:30 mail sshd[5288]: Failed password for root from 222.186.175.154 port 29316 ssh2 Dec 12 22:00:34 mail sshd[5288]: Failed password for root from 222.186.175.154 port 29316 ssh2 Dec 12 22:00:39 mail sshd[5288]: Failed password for root from 222.186.175.154 port 29316 ssh2 |
2019-12-13 05:13:47 |
46.246.138.180 | attackbots | Autoban 46.246.138.180 AUTH/CONNECT |
2019-12-13 05:47:03 |
5.133.66.109 | attack | Autoban 5.133.66.109 AUTH/CONNECT |
2019-12-13 05:25:12 |
59.144.137.134 | attackspambots | Dec 12 19:43:45 fr01 sshd[16502]: Invalid user retea from 59.144.137.134 ... |
2019-12-13 05:46:35 |
5.133.66.118 | attackbots | Autoban 5.133.66.118 AUTH/CONNECT |
2019-12-13 05:22:50 |
46.29.116.3 | attackspam | Autoban 46.29.116.3 AUTH/CONNECT |
2019-12-13 05:44:16 |
202.143.111.156 | attack | Dec 12 18:45:46 localhost sshd\[6007\]: Invalid user kirschbaum from 202.143.111.156 port 55462 Dec 12 18:45:46 localhost sshd\[6007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.143.111.156 Dec 12 18:45:48 localhost sshd\[6007\]: Failed password for invalid user kirschbaum from 202.143.111.156 port 55462 ssh2 |
2019-12-13 05:14:10 |