城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.92.94.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.92.94.14. IN A
;; AUTHORITY SECTION:
. 187 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 19:06:14 CST 2022
;; MSG SIZE rcvd: 105
14.94.92.119.in-addr.arpa domain name pointer 119.92.94.14.static.pldt.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.94.92.119.in-addr.arpa name = 119.92.94.14.static.pldt.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.72.139.6 | attackspambots | Automatic report - Banned IP Access |
2019-08-22 22:13:12 |
| 73.147.192.183 | attackspam | DATE:2019-08-22 11:23:49, IP:73.147.192.183, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-08-22 21:18:38 |
| 183.82.112.113 | attackspambots | Unauthorised access (Aug 22) SRC=183.82.112.113 LEN=52 PREC=0x20 TTL=115 ID=19911 DF TCP DPT=445 WINDOW=8192 SYN |
2019-08-22 21:22:46 |
| 5.181.151.92 | attack | Aug 22 13:02:56 docs sshd\[12995\]: Invalid user flume123 from 5.181.151.92Aug 22 13:02:59 docs sshd\[12995\]: Failed password for invalid user flume123 from 5.181.151.92 port 47448 ssh2Aug 22 13:07:06 docs sshd\[13160\]: Invalid user maundy from 5.181.151.92Aug 22 13:07:08 docs sshd\[13160\]: Failed password for invalid user maundy from 5.181.151.92 port 36556 ssh2Aug 22 13:11:09 docs sshd\[13323\]: Invalid user nagiosadmin from 5.181.151.92Aug 22 13:11:12 docs sshd\[13323\]: Failed password for invalid user nagiosadmin from 5.181.151.92 port 53896 ssh2 ... |
2019-08-22 20:52:06 |
| 89.100.106.42 | attackspambots | Automatic report - Banned IP Access |
2019-08-22 21:08:19 |
| 37.187.117.187 | attackspambots | Aug 22 14:21:25 dedicated sshd[6780]: Invalid user admin from 37.187.117.187 port 50642 |
2019-08-22 20:42:56 |
| 46.101.77.58 | attack | Invalid user bogdan from 46.101.77.58 port 41815 |
2019-08-22 21:51:32 |
| 58.57.4.238 | attackspambots | Aug 22 04:41:54 web1 postfix/smtpd[17731]: warning: unknown[58.57.4.238]: SASL LOGIN authentication failed: authentication failure ... |
2019-08-22 22:07:57 |
| 222.186.42.117 | attackspambots | Aug 22 15:25:22 legacy sshd[29789]: Failed password for root from 222.186.42.117 port 39548 ssh2 Aug 22 15:25:23 legacy sshd[29789]: Failed password for root from 222.186.42.117 port 39548 ssh2 Aug 22 15:25:26 legacy sshd[29789]: Failed password for root from 222.186.42.117 port 39548 ssh2 ... |
2019-08-22 21:29:37 |
| 118.24.255.191 | attack | Aug 22 07:39:54 Tower sshd[5846]: Connection from 118.24.255.191 port 35436 on 192.168.10.220 port 22 Aug 22 07:39:56 Tower sshd[5846]: Invalid user seb from 118.24.255.191 port 35436 Aug 22 07:39:56 Tower sshd[5846]: error: Could not get shadow information for NOUSER Aug 22 07:39:56 Tower sshd[5846]: Failed password for invalid user seb from 118.24.255.191 port 35436 ssh2 Aug 22 07:39:57 Tower sshd[5846]: Received disconnect from 118.24.255.191 port 35436:11: Bye Bye [preauth] Aug 22 07:39:57 Tower sshd[5846]: Disconnected from invalid user seb 118.24.255.191 port 35436 [preauth] |
2019-08-22 21:01:25 |
| 92.118.37.74 | attack | Aug 22 15:21:00 h2177944 kernel: \[4803667.166847\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=61736 PROTO=TCP SPT=46525 DPT=25704 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 22 15:21:05 h2177944 kernel: \[4803672.991566\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64292 PROTO=TCP SPT=46525 DPT=15752 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 22 15:21:13 h2177944 kernel: \[4803680.233984\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=42012 PROTO=TCP SPT=46525 DPT=35312 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 22 15:21:24 h2177944 kernel: \[4803691.585332\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=59395 PROTO=TCP SPT=46525 DPT=30317 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 22 15:23:05 h2177944 kernel: \[4803792.402170\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 |
2019-08-22 22:05:42 |
| 94.23.204.136 | attack | Aug 22 10:36:06 localhost sshd\[4835\]: Invalid user gaya from 94.23.204.136 port 35270 Aug 22 10:36:06 localhost sshd\[4835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.204.136 Aug 22 10:36:09 localhost sshd\[4835\]: Failed password for invalid user gaya from 94.23.204.136 port 35270 ssh2 Aug 22 10:40:06 localhost sshd\[5099\]: Invalid user akhtar from 94.23.204.136 port 51530 Aug 22 10:40:06 localhost sshd\[5099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.204.136 ... |
2019-08-22 20:49:08 |
| 62.210.167.202 | attackspam | \[2019-08-22 09:27:36\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-22T09:27:36.387-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="48101116024836920",SessionID="0x7f7b303e5718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/62555",ACLName="no_extension_match" \[2019-08-22 09:27:56\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-22T09:27:56.084-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1370017193090102",SessionID="0x7f7b301c17c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/63656",ACLName="no_extension_match" \[2019-08-22 09:28:14\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-22T09:28:14.827-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01178514242671090",SessionID="0x7f7b303e5718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/62080",ACLName |
2019-08-22 21:29:04 |
| 123.207.245.120 | attack | Aug 22 13:08:50 MK-Soft-VM7 sshd\[10592\]: Invalid user debbie from 123.207.245.120 port 40802 Aug 22 13:08:50 MK-Soft-VM7 sshd\[10592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.245.120 Aug 22 13:08:52 MK-Soft-VM7 sshd\[10592\]: Failed password for invalid user debbie from 123.207.245.120 port 40802 ssh2 ... |
2019-08-22 21:13:16 |
| 51.77.220.6 | attackspambots | Aug 22 11:28:25 marvibiene sshd[16626]: Invalid user flopy from 51.77.220.6 port 40352 Aug 22 11:28:25 marvibiene sshd[16626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.6 Aug 22 11:28:25 marvibiene sshd[16626]: Invalid user flopy from 51.77.220.6 port 40352 Aug 22 11:28:28 marvibiene sshd[16626]: Failed password for invalid user flopy from 51.77.220.6 port 40352 ssh2 ... |
2019-08-22 20:51:07 |