城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): NIPA TECHNOLOGY CO., LTD
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.5.146.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33698
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.5.146.6. IN A
;; AUTHORITY SECTION:
. 1730 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051000 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 10 19:12:48 +08 2019
;; MSG SIZE rcvd: 115
6.146.5.139.in-addr.arpa domain name pointer rev-dns-cloud-bkk-6-146-5-139-th.nipa.cloud.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
6.146.5.139.in-addr.arpa name = rev-dns-cloud-bkk-6-146-5-139-th.nipa.cloud.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
185.43.209.185 | attackspambots | Nov 14 21:35:52 andromeda postfix/smtpd\[27371\]: warning: unknown\[185.43.209.185\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:35:52 andromeda postfix/smtpd\[27371\]: warning: unknown\[185.43.209.185\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:35:52 andromeda postfix/smtpd\[27371\]: warning: unknown\[185.43.209.185\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:35:52 andromeda postfix/smtpd\[27371\]: warning: unknown\[185.43.209.185\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:35:52 andromeda postfix/smtpd\[27371\]: warning: unknown\[185.43.209.185\]: SASL LOGIN authentication failed: authentication failure |
2019-11-15 05:12:02 |
185.143.223.118 | attackbotsspam | Port scan on 12 port(s): 5657 7625 12161 12324 13032 14344 14445 26869 34347 36636 47477 61112 |
2019-11-15 05:33:37 |
2.50.161.229 | attackspambots | Unauthorized connection attempt from IP address 2.50.161.229 on Port 445(SMB) |
2019-11-15 05:21:09 |
201.182.162.219 | attack | port scan and connect, tcp 23 (telnet) |
2019-11-15 05:49:39 |
101.227.59.50 | attackspambots | Unauthorized connection attempt from IP address 101.227.59.50 on Port 445(SMB) |
2019-11-15 05:40:02 |
94.36.226.38 | attackbotsspam | Port Scan: TCP/23 |
2019-11-15 05:37:41 |
117.48.212.113 | attack | Invalid user pqowieuryt from 117.48.212.113 port 58958 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.212.113 Failed password for invalid user pqowieuryt from 117.48.212.113 port 58958 ssh2 Invalid user bng5 from 117.48.212.113 port 36978 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.212.113 |
2019-11-15 05:14:30 |
41.39.194.28 | attackbots | Unauthorized connection attempt from IP address 41.39.194.28 on Port 445(SMB) |
2019-11-15 05:35:51 |
124.102.36.53 | attackbots | Honeypot attack, port: 23, PTR: p371053-ffoma1yoyogi.tokyo.ocn.ne.jp. |
2019-11-15 05:29:50 |
206.189.131.213 | attackbotsspam | Invalid user hadoop from 206.189.131.213 port 42578 |
2019-11-15 05:43:42 |
93.33.206.188 | attackbots | Nov 14 22:51:25 gw1 sshd[947]: Failed password for root from 93.33.206.188 port 33348 ssh2 ... |
2019-11-15 05:40:40 |
185.43.209.96 | attackspam | Nov 14 21:32:19 andromeda postfix/smtpd\[25194\]: warning: unknown\[185.43.209.96\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:32:19 andromeda postfix/smtpd\[25194\]: warning: unknown\[185.43.209.96\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:32:20 andromeda postfix/smtpd\[25194\]: warning: unknown\[185.43.209.96\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:32:20 andromeda postfix/smtpd\[25194\]: warning: unknown\[185.43.209.96\]: SASL LOGIN authentication failed: authentication failure Nov 14 21:32:20 andromeda postfix/smtpd\[25194\]: warning: unknown\[185.43.209.96\]: SASL LOGIN authentication failed: authentication failure |
2019-11-15 05:12:31 |
193.112.42.13 | attackspam | Nov 14 22:12:43 eventyay sshd[23275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.42.13 Nov 14 22:12:45 eventyay sshd[23275]: Failed password for invalid user sysadmin from 193.112.42.13 port 50256 ssh2 Nov 14 22:16:44 eventyay sshd[23332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.42.13 ... |
2019-11-15 05:24:59 |
187.1.85.178 | attack | Unauthorized connection attempt from IP address 187.1.85.178 on Port 445(SMB) |
2019-11-15 05:45:28 |
118.89.35.168 | attackbotsspam | Invalid user sm from 118.89.35.168 port 57406 |
2019-11-15 05:33:21 |