城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.207.214.201 | attackbotsspam | Unauthorized connection attempt from IP address 14.207.214.201 on Port 445(SMB) |
2019-09-01 05:26:32 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.214.251
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.214.251. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:31:08 CST 2022
;; MSG SIZE rcvd: 107
251.214.207.14.in-addr.arpa domain name pointer mx-ll-14.207.214-251.dynamic.3bb.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
251.214.207.14.in-addr.arpa name = mx-ll-14.207.214-251.dynamic.3bb.co.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.179.201.114 | attack | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(11190859) |
2019-11-19 18:14:35 |
| 177.38.10.98 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=35186)(11190859) |
2019-11-19 18:10:21 |
| 58.96.206.3 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=45645)(11190859) |
2019-11-19 17:45:34 |
| 177.191.163.42 | attack | [portscan] tcp/23 [TELNET] *(RWIN=8629)(11190859) |
2019-11-19 17:53:16 |
| 202.91.84.148 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14600)(11190859) |
2019-11-19 17:50:31 |
| 139.220.192.57 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-19 17:56:33 |
| 171.241.71.1 | attack | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(11190859) |
2019-11-19 17:39:02 |
| 112.17.107.86 | attackspambots | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(11190859) |
2019-11-19 17:41:20 |
| 104.152.52.72 | attack | [MultiHost/MultiPort scan (14)] tcp/110, tcp/135, tcp/143, tcp/1433, tcp/21, tcp/22, tcp/23, tcp/3306, tcp/3389, tcp/5060, tcp/5357, tcp/554, tcp/81, tcp/993 [scan/connect: 32 time(s)] *(RWIN=14600)(11190859) |
2019-11-19 17:59:32 |
| 95.79.34.52 | attack | [portscan] tcp/1433 [MsSQL] [scan/connect: 2 time(s)] in DroneBL:'listed [DDOS Drone]' *(RWIN=1024)(11190859) |
2019-11-19 18:16:46 |
| 91.151.111.221 | attack | [portscan] tcp/23 [TELNET] *(RWIN=38019)(11190859) |
2019-11-19 17:42:57 |
| 89.36.147.124 | attack | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(11190859) |
2019-11-19 18:17:40 |
| 125.24.184.106 | attack | Automatic report - Port Scan Attack |
2019-11-19 18:12:06 |
| 131.221.250.232 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=2571)(11190859) |
2019-11-19 18:11:41 |
| 121.26.201.158 | attackspam | [portscan] tcp/21 [FTP] [scan/connect: 6 time(s)] in blocklist.de:'listed [ftp]' *(RWIN=65535)(11190859) |
2019-11-19 17:40:10 |