城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.196.12.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.196.12.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:14:40 CST 2025
;; MSG SIZE rcvd: 106
14.12.196.122.in-addr.arpa domain name pointer zaq7ac40c0e.rev.zaq.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.12.196.122.in-addr.arpa name = zaq7ac40c0e.rev.zaq.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 217.197.177.109 | attackspambots | Automatic report - Port Scan Attack |
2019-09-13 01:41:22 |
| 177.185.241.131 | attackspambots | Sep 12 17:48:49 mail sshd\[31626\]: Invalid user 1 from 177.185.241.131 port 36011 Sep 12 17:48:49 mail sshd\[31626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.241.131 Sep 12 17:48:51 mail sshd\[31626\]: Failed password for invalid user 1 from 177.185.241.131 port 36011 ssh2 Sep 12 17:56:14 mail sshd\[32563\]: Invalid user superuser from 177.185.241.131 port 38256 Sep 12 17:56:14 mail sshd\[32563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.241.131 |
2019-09-13 02:04:52 |
| 74.208.252.136 | attack | Sep 12 18:56:00 MK-Soft-Root2 sshd\[17865\]: Invalid user ftptest from 74.208.252.136 port 42628 Sep 12 18:56:00 MK-Soft-Root2 sshd\[17865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136 Sep 12 18:56:02 MK-Soft-Root2 sshd\[17865\]: Failed password for invalid user ftptest from 74.208.252.136 port 42628 ssh2 ... |
2019-09-13 02:14:46 |
| 176.119.134.184 | attackspambots | Automatic report - Port Scan Attack |
2019-09-13 02:15:52 |
| 106.12.132.187 | attackbotsspam | Sep 12 17:01:38 microserver sshd[63074]: Invalid user m1necraft from 106.12.132.187 port 52526 Sep 12 17:01:38 microserver sshd[63074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 Sep 12 17:01:39 microserver sshd[63074]: Failed password for invalid user m1necraft from 106.12.132.187 port 52526 ssh2 Sep 12 17:05:48 microserver sshd[63780]: Invalid user 123 from 106.12.132.187 port 55626 Sep 12 17:05:48 microserver sshd[63780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 Sep 12 17:19:17 microserver sshd[65481]: Invalid user webserver from 106.12.132.187 port 35686 Sep 12 17:19:17 microserver sshd[65481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 Sep 12 17:19:19 microserver sshd[65481]: Failed password for invalid user webserver from 106.12.132.187 port 35686 ssh2 Sep 12 17:23:39 microserver sshd[1110]: Invalid user 12345678 from 106.12 |
2019-09-13 02:13:35 |
| 109.254.64.64 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 13:42:33,161 INFO [amun_request_handler] PortScan Detected on Port: 445 (109.254.64.64) |
2019-09-13 01:50:24 |
| 198.108.66.26 | attack | 5900/tcp 9200/tcp 465/tcp... [2019-07-17/09-12]10pkt,7pt.(tcp) |
2019-09-13 02:15:23 |
| 173.248.228.75 | attack | Sep 12 20:21:23 legacy sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.228.75 Sep 12 20:21:24 legacy sshd[27933]: Failed password for invalid user cloudadmin from 173.248.228.75 port 60374 ssh2 Sep 12 20:27:24 legacy sshd[28115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.228.75 ... |
2019-09-13 02:31:45 |
| 162.62.17.164 | attack | firewall-block, port(s): 8000/tcp |
2019-09-13 02:47:12 |
| 94.24.39.209 | attackbots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-09-13 02:17:47 |
| 103.250.36.113 | attackspam | Sep 12 19:56:11 markkoudstaal sshd[15130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.36.113 Sep 12 19:56:13 markkoudstaal sshd[15130]: Failed password for invalid user www from 103.250.36.113 port 28449 ssh2 Sep 12 20:03:17 markkoudstaal sshd[15777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.36.113 |
2019-09-13 02:18:26 |
| 213.129.99.10 | attackspambots | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-09-13 02:20:11 |
| 202.235.195.2 | attack | 2019-09-12T18:41:16.505995abusebot-2.cloudsearch.cf sshd\[3859\]: Invalid user user from 202.235.195.2 port 53622 |
2019-09-13 02:48:17 |
| 34.69.191.209 | attackbotsspam | (Sep 12) LEN=40 TTL=52 ID=1573 TCP DPT=8080 WINDOW=5358 SYN (Sep 12) LEN=40 TTL=53 ID=13435 TCP DPT=8080 WINDOW=60743 SYN (Sep 12) LEN=40 TTL=52 ID=42837 TCP DPT=8080 WINDOW=59874 SYN (Sep 12) LEN=40 TTL=52 ID=3015 TCP DPT=8080 WINDOW=25012 SYN (Sep 12) LEN=40 TTL=52 ID=59021 TCP DPT=8080 WINDOW=16610 SYN (Sep 12) LEN=40 TTL=52 ID=7647 TCP DPT=8080 WINDOW=44022 SYN (Sep 12) LEN=40 TTL=52 ID=36764 TCP DPT=8080 WINDOW=6500 SYN (Sep 12) LEN=40 TTL=55 ID=23357 TCP DPT=8080 WINDOW=60556 SYN (Sep 12) LEN=40 TTL=52 ID=1901 TCP DPT=8080 WINDOW=19806 SYN (Sep 12) LEN=40 TTL=53 ID=24429 TCP DPT=8080 WINDOW=57385 SYN (Sep 11) LEN=40 TTL=52 ID=26095 TCP DPT=8080 WINDOW=18172 SYN (Sep 11) LEN=40 TTL=52 ID=12003 TCP DPT=8080 WINDOW=53028 SYN (Sep 11) LEN=40 TTL=52 ID=59153 TCP DPT=8080 WINDOW=47878 SYN (Sep 11) LEN=40 TTL=53 ID=12542 TCP DPT=8080 WINDOW=24755 SYN (Sep 11) LEN=40 TTL=52 ID=27376 TCP DPT=8080 WINDOW=6041 SYN (Sep 11) LEN=40 TTL=52 ID=2024... |
2019-09-13 02:11:13 |
| 153.36.242.143 | attack | Sep 12 07:52:24 aiointranet sshd\[26728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143 user=root Sep 12 07:52:26 aiointranet sshd\[26728\]: Failed password for root from 153.36.242.143 port 33652 ssh2 Sep 12 07:52:28 aiointranet sshd\[26728\]: Failed password for root from 153.36.242.143 port 33652 ssh2 Sep 12 07:52:31 aiointranet sshd\[26728\]: Failed password for root from 153.36.242.143 port 33652 ssh2 Sep 12 07:58:44 aiointranet sshd\[27248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143 user=root |
2019-09-13 02:00:51 |