城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.179.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.179.103.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:26:27 CST 2022
;; MSG SIZE  rcvd: 107
        103.179.207.14.in-addr.arpa domain name pointer mx-ll-14.207.179-103.dynamic.3bb.in.th.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
103.179.207.14.in-addr.arpa	name = mx-ll-14.207.179-103.dynamic.3bb.in.th.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 92.118.161.21 | attackspambots | Unauthorized connection attempt detected from IP address 92.118.161.21 to port 2001 [J]  | 
                    2020-01-18 05:59:12 | 
| 222.186.175.220 | attackbots | Unauthorized connection attempt detected from IP address 222.186.175.220 to port 22 [J]  | 
                    2020-01-18 06:15:08 | 
| 205.209.159.201 | attackspam | 01/17/2020-16:52:18.040907 205.209.159.201 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306  | 
                    2020-01-18 05:58:56 | 
| 190.206.162.130 | attackspambots | Honeypot attack, port: 445, PTR: 190-206-162-130.dyn.dsl.cantv.net.  | 
                    2020-01-18 05:46:25 | 
| 106.12.86.205 | attackspambots | Jan 17 23:03:01 dedicated sshd[5217]: Invalid user minecraft from 106.12.86.205 port 46950  | 
                    2020-01-18 06:06:41 | 
| 106.13.172.94 | attackbots | Jan 17 23:12:36 MK-Soft-VM7 sshd[20976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.172.94 Jan 17 23:12:38 MK-Soft-VM7 sshd[20976]: Failed password for invalid user hugo from 106.13.172.94 port 57962 ssh2 ...  | 
                    2020-01-18 06:21:39 | 
| 118.69.142.98 | attack | Unauthorized connection attempt detected from IP address 118.69.142.98 to port 81 [T]  | 
                    2020-01-18 06:13:18 | 
| 36.91.152.234 | attackspambots | Jan 17 22:42:19 vpn01 sshd[32232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.152.234 Jan 17 22:42:21 vpn01 sshd[32232]: Failed password for invalid user crc from 36.91.152.234 port 60714 ssh2 ...  | 
                    2020-01-18 06:10:28 | 
| 201.49.200.50 | attack | Honeypot attack, port: 445, PTR: 50.200.49.201.assim.net.  | 
                    2020-01-18 06:01:05 | 
| 222.186.180.6 | attackspam | Jan 17 22:47:51 h2177944 sshd\[414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Jan 17 22:47:53 h2177944 sshd\[414\]: Failed password for root from 222.186.180.6 port 43120 ssh2 Jan 17 22:47:56 h2177944 sshd\[414\]: Failed password for root from 222.186.180.6 port 43120 ssh2 Jan 17 22:48:00 h2177944 sshd\[414\]: Failed password for root from 222.186.180.6 port 43120 ssh2 ...  | 
                    2020-01-18 05:54:43 | 
| 189.253.79.6 | attack | Honeypot attack, port: 445, PTR: dsl-189-253-79-6-dyn.prod-infinitum.com.mx.  | 
                    2020-01-18 05:54:59 | 
| 190.208.29.172 | attack | Honeypot attack, port: 5555, PTR: PTR record not found  | 
                    2020-01-18 05:50:05 | 
| 186.225.60.102 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-01-18 06:07:34 | 
| 41.77.146.98 | attackspambots | 2020-01-17T21:54:43.439429shield sshd\[14554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98 user=root 2020-01-17T21:54:46.121321shield sshd\[14554\]: Failed password for root from 41.77.146.98 port 48730 ssh2 2020-01-17T21:59:48.201061shield sshd\[16737\]: Invalid user mc from 41.77.146.98 port 40736 2020-01-17T21:59:48.205378shield sshd\[16737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98 2020-01-17T21:59:50.425470shield sshd\[16737\]: Failed password for invalid user mc from 41.77.146.98 port 40736 ssh2  | 
                    2020-01-18 06:13:45 | 
| 62.4.55.219 | attackspambots | Honeypot attack, port: 1, PTR: cable-cgn.219.mtel.me.  | 
                    2020-01-18 06:16:43 |