城市(city): Pingtung City
省份(region): Pingtung
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): Data Communication Business Group
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.40.247.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13710
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.40.247.149. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019041600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 17 00:50:29 +08 2019
;; MSG SIZE rcvd: 118
149.247.40.114.in-addr.arpa domain name pointer 114-40-247-149.dynamic-ip.hinet.net.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
149.247.40.114.in-addr.arpa name = 114-40-247-149.dynamic-ip.hinet.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
106.13.6.116 | attackbots | Feb 18 04:38:10 auw2 sshd\[20337\]: Invalid user adm from 106.13.6.116 Feb 18 04:38:10 auw2 sshd\[20337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 Feb 18 04:38:13 auw2 sshd\[20337\]: Failed password for invalid user adm from 106.13.6.116 port 55204 ssh2 Feb 18 04:40:22 auw2 sshd\[20653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 user=root Feb 18 04:40:24 auw2 sshd\[20653\]: Failed password for root from 106.13.6.116 port 44324 ssh2 |
2020-02-18 23:09:53 |
79.137.84.144 | attack | 2020-02-18T16:14:33.531542 sshd[1344]: Invalid user test from 79.137.84.144 port 44528 2020-02-18T16:14:33.545418 sshd[1344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.84.144 2020-02-18T16:14:33.531542 sshd[1344]: Invalid user test from 79.137.84.144 port 44528 2020-02-18T16:14:35.625708 sshd[1344]: Failed password for invalid user test from 79.137.84.144 port 44528 ssh2 ... |
2020-02-18 23:36:53 |
179.162.130.17 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 18-02-2020 13:25:10. |
2020-02-18 23:44:36 |
103.244.142.189 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 23:46:52 |
14.231.148.251 | attackbots | Feb 18 14:25:34 grey postfix/smtpd\[25713\]: NOQUEUE: reject: RCPT from unknown\[14.231.148.251\]: 554 5.7.1 Service unavailable\; Client host \[14.231.148.251\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?14.231.148.251\; from=\ |
2020-02-18 23:15:59 |
197.248.38.174 | attackspam | trying to access non-authorized port |
2020-02-18 23:28:05 |
71.6.199.23 | attackspambots | 02/18/2020-08:25:13.913422 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71 |
2020-02-18 23:40:31 |
219.85.105.148 | attackspambots | 20/2/18@08:25:02: FAIL: Alarm-Intrusion address from=219.85.105.148 ... |
2020-02-18 23:52:43 |
200.69.236.229 | attackbotsspam | Feb 18 14:52:57 silence02 sshd[21832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.229 Feb 18 14:52:59 silence02 sshd[21832]: Failed password for invalid user garet from 200.69.236.229 port 59020 ssh2 Feb 18 14:56:57 silence02 sshd[22033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.236.229 |
2020-02-18 23:11:51 |
112.85.42.186 | attackbotsspam | Feb 18 20:48:04 areeb-Workstation sshd[6655]: Failed password for root from 112.85.42.186 port 43251 ssh2 Feb 18 20:48:08 areeb-Workstation sshd[6655]: Failed password for root from 112.85.42.186 port 43251 ssh2 ... |
2020-02-18 23:53:59 |
67.198.188.119 | attack | Postfix RBL failed |
2020-02-18 23:48:02 |
92.222.78.178 | attack | Feb 18 15:34:22 SilenceServices sshd[15322]: Failed password for root from 92.222.78.178 port 35450 ssh2 Feb 18 15:44:06 SilenceServices sshd[29119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178 Feb 18 15:44:08 SilenceServices sshd[29119]: Failed password for invalid user mouse from 92.222.78.178 port 40056 ssh2 |
2020-02-18 23:13:13 |
37.29.117.211 | attack | 1582032338 - 02/18/2020 14:25:38 Host: 37.29.117.211/37.29.117.211 Port: 445 TCP Blocked |
2020-02-18 23:11:31 |
14.253.189.198 | attack | Automatic report - Port Scan Attack |
2020-02-18 23:33:02 |
114.32.128.160 | attackbots | port scan and connect, tcp 23 (telnet) |
2020-02-18 23:14:46 |