城市(city): Zhengzhou
省份(region): Henan
国家(country): China
运营商(isp): China Unicom
主机名(hostname): unknown
机构(organization): CHINA UNICOM China169 Backbone
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.14.254.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49615
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;123.14.254.42. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 12 01:38:09 CST 2019
;; MSG SIZE rcvd: 117
42.254.14.123.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
42.254.14.123.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.51.198.90 | attackspam | Aug 6 09:26:56 ip40 sshd[28284]: Failed password for root from 122.51.198.90 port 36192 ssh2 ... |
2020-08-06 18:06:00 |
| 34.89.218.244 | attackbotsspam | 06.08.2020 07:20:18 - Bad Robot Ignore Robots.txt |
2020-08-06 18:10:21 |
| 51.83.216.207 | attack | 2020-08-05 11:49:49 Reject access to port(s):3389 1 times a day |
2020-08-06 18:31:07 |
| 181.176.220.91 | attack | 2020-08-05 09:07:00 Reject access to port(s):3389 2 times a day |
2020-08-06 18:24:27 |
| 51.178.83.124 | attack | Aug 6 04:17:00 mail sshd\[55109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.83.124 user=root ... |
2020-08-06 18:06:16 |
| 106.13.84.151 | attackspambots | Brute force attempt |
2020-08-06 17:58:10 |
| 194.61.27.246 | attack | TCP port : 3389 |
2020-08-06 18:20:46 |
| 116.247.81.99 | attackbotsspam | Bruteforce detected by fail2ban |
2020-08-06 18:15:48 |
| 122.114.222.52 | attackspam | Fail2Ban |
2020-08-06 18:03:50 |
| 188.165.126.60 | attackspam | Unauthorized connection attempt from IP address 188.165.126.60 on Port 3389(RDP) |
2020-08-06 18:22:21 |
| 45.129.33.6 | attack | Port Scan |
2020-08-06 18:32:55 |
| 43.255.71.195 | attack | Aug 6 15:16:10 lunarastro sshd[17080]: Failed password for root from 43.255.71.195 port 55816 ssh2 Aug 6 15:18:01 lunarastro sshd[17093]: Failed password for root from 43.255.71.195 port 36543 ssh2 |
2020-08-06 17:59:52 |
| 13.71.39.228 | attack | Aug 6 01:20:20 mail sshd\[55690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.39.228 user=root ... |
2020-08-06 18:00:14 |
| 88.44.102.116 | attackbots | Port scan denied |
2020-08-06 18:27:47 |
| 157.230.249.90 | attackspam | fail2ban detected bruce force on ssh iptables |
2020-08-06 18:09:28 |