城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.39.214.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.39.214.190. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:17:28 CST 2025
;; MSG SIZE rcvd: 107
190.214.39.124.in-addr.arpa domain name pointer 124x39x214x190.ap124.ftth.ucom.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
190.214.39.124.in-addr.arpa name = 124x39x214x190.ap124.ftth.ucom.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.215.248.238 | attack | Unauthorized connection attempt detected from IP address 213.215.248.238 to port 445 |
2019-12-13 01:04:30 |
| 81.213.149.111 | attack | 445/tcp 445/tcp [2019-12-12]2pkt |
2019-12-13 01:08:44 |
| 45.93.20.186 | attackbots | 35003/tcp 23824/tcp 21027/tcp... [2019-11-29/12-12]9pkt,9pt.(tcp) |
2019-12-13 01:04:11 |
| 180.176.104.118 | attack | 445/tcp [2019-12-12]1pkt |
2019-12-13 01:10:21 |
| 104.254.92.22 | attackbotsspam | (From toni.milerum@gmail.com) Do you want to promote your business on tons of online ad sites monthly? One tiny investment every month will get you virtually endless traffic to your site forever!To find out more check out our site here: http://www.submitmyadnow.tech |
2019-12-13 01:00:20 |
| 63.81.87.81 | attackspam | Autoban 63.81.87.81 AUTH/CONNECT |
2019-12-13 00:58:59 |
| 63.81.90.188 | attackbots | Autoban 63.81.90.188 AUTH/CONNECT |
2019-12-13 00:49:39 |
| 106.13.9.153 | attack | Dec 12 15:49:08 zeus sshd[7369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.153 Dec 12 15:49:10 zeus sshd[7369]: Failed password for invalid user bkp from 106.13.9.153 port 53434 ssh2 Dec 12 15:56:50 zeus sshd[7541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.153 Dec 12 15:56:52 zeus sshd[7541]: Failed password for invalid user vivyan from 106.13.9.153 port 53692 ssh2 |
2019-12-13 01:06:07 |
| 183.111.227.199 | attackbotsspam | Triggered by Fail2Ban at Vostok web server |
2019-12-13 01:26:37 |
| 114.24.198.38 | attack | 23/tcp [2019-12-12]1pkt |
2019-12-13 01:26:57 |
| 49.88.112.73 | attack | Dec 12 16:14:01 pi sshd\[18752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73 user=root Dec 12 16:14:03 pi sshd\[18752\]: Failed password for root from 49.88.112.73 port 26989 ssh2 Dec 12 16:14:07 pi sshd\[18752\]: Failed password for root from 49.88.112.73 port 26989 ssh2 Dec 12 16:14:10 pi sshd\[18752\]: Failed password for root from 49.88.112.73 port 26989 ssh2 Dec 12 16:45:37 pi sshd\[20191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73 user=root ... |
2019-12-13 01:30:41 |
| 129.28.128.149 | attackspam | Dec 12 17:29:54 legacy sshd[13394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.128.149 Dec 12 17:29:55 legacy sshd[13394]: Failed password for invalid user cy from 129.28.128.149 port 50892 ssh2 Dec 12 17:38:21 legacy sshd[13685]: Failed password for root from 129.28.128.149 port 54762 ssh2 ... |
2019-12-13 00:59:40 |
| 202.200.142.251 | attack | 2019-12-12T15:37:05.002236shield sshd\[11497\]: Invalid user atse from 202.200.142.251 port 39328 2019-12-12T15:37:05.006682shield sshd\[11497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.200.142.251 2019-12-12T15:37:07.059085shield sshd\[11497\]: Failed password for invalid user atse from 202.200.142.251 port 39328 ssh2 2019-12-12T15:44:20.356888shield sshd\[12806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.200.142.251 user=root 2019-12-12T15:44:22.459622shield sshd\[12806\]: Failed password for root from 202.200.142.251 port 38916 ssh2 |
2019-12-13 00:53:16 |
| 63.81.87.115 | attackspam | Autoban 63.81.87.115 AUTH/CONNECT |
2019-12-13 01:12:35 |
| 111.198.54.177 | attackspambots | Dec 12 16:18:35 work-partkepr sshd\[31681\]: Invalid user hayamizu from 111.198.54.177 port 40260 Dec 12 16:18:35 work-partkepr sshd\[31681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177 ... |
2019-12-13 01:13:25 |