城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.120.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.120.200. IN A
;; AUTHORITY SECTION:
. 535 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:50:08 CST 2022
;; MSG SIZE rcvd: 107
200.120.207.14.in-addr.arpa domain name pointer mx-ll-14.207.120-200.dynamic.3bb.in.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
200.120.207.14.in-addr.arpa name = mx-ll-14.207.120-200.dynamic.3bb.in.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.75.161.33 | attackspambots | Multiport scan 33 ports : 848 2046 2933 3133 3924 4566 4782 7477 7746 9124 9483 11678 13204 14440 17554 17964 18582 18908 19930 22053 25556 25575 25640 26402 27204 27404 28913 29477 29903 30365 30818 30905 32699 |
2020-05-12 08:51:42 |
| 185.176.27.246 | attack | 05/11/2020-23:55:38.064214 185.176.27.246 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-12 12:01:14 |
| 86.122.68.179 | attack | firewall-block, port(s): 8080/tcp |
2020-05-12 08:37:54 |
| 68.183.95.11 | attackspambots | May 12 01:25:40 h1745522 sshd[12423]: Invalid user prueba from 68.183.95.11 port 43508 May 12 01:25:40 h1745522 sshd[12423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.95.11 May 12 01:25:40 h1745522 sshd[12423]: Invalid user prueba from 68.183.95.11 port 43508 May 12 01:25:41 h1745522 sshd[12423]: Failed password for invalid user prueba from 68.183.95.11 port 43508 ssh2 May 12 01:29:51 h1745522 sshd[12912]: Invalid user info from 68.183.95.11 port 49894 May 12 01:29:51 h1745522 sshd[12912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.95.11 May 12 01:29:51 h1745522 sshd[12912]: Invalid user info from 68.183.95.11 port 49894 May 12 01:29:53 h1745522 sshd[12912]: Failed password for invalid user info from 68.183.95.11 port 49894 ssh2 May 12 01:34:00 h1745522 sshd[13427]: Invalid user sharp from 68.183.95.11 port 56278 ... |
2020-05-12 08:44:11 |
| 79.124.62.86 | attackspambots | Port scan on 4 port(s): 3459 8922 11200 13140 |
2020-05-12 08:42:47 |
| 80.82.77.212 | attackspambots | firewall-block, port(s): 17/udp, 49154/udp |
2020-05-12 08:39:47 |
| 180.127.106.29 | attackspambots | ET EXPLOIT MVPower DVR Shell UCE - port: 80 proto: TCP cat: Attempted Administrator Privilege Gain |
2020-05-12 08:22:40 |
| 94.102.51.16 | attackspambots | May 12 00:06:37 debian-2gb-nbg1-2 kernel: \[11493662.432027\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.16 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=62452 PROTO=TCP SPT=44053 DPT=62134 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-12 08:31:26 |
| 94.102.50.136 | attack | SmallBizIT.US 3 packets to tcp(225,228,229) |
2020-05-12 08:32:16 |
| 51.79.57.12 | attack | May 12 02:32:09 debian-2gb-nbg1-2 kernel: \[11502394.848880\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.79.57.12 DST=195.201.40.59 LEN=472 TOS=0x18 PREC=0x00 TTL=238 ID=1249 PROTO=UDP SPT=9090 DPT=5060 LEN=452 |
2020-05-12 08:51:19 |
| 92.118.234.242 | attackspam | *Port Scan* detected from 92.118.234.242 (US/United States/California/Los Angeles/-). 4 hits in the last 40 seconds |
2020-05-12 08:32:57 |
| 51.91.247.125 | attack | Multiport scan : 10 ports scanned 21 4443 4643 5800 8082 9051 9333 9418 16010 27017 |
2020-05-12 08:49:59 |
| 95.79.101.229 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 92 - port: 23 proto: TCP cat: Misc Attack |
2020-05-12 08:28:51 |
| 104.206.128.34 | attackspambots | GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak |
2020-05-12 08:27:31 |
| 89.248.168.218 | attackbots | 05/11/2020-20:25:57.256845 89.248.168.218 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-12 08:36:28 |