城市(city): Passo Fundo
省份(region): Rio Grande do Sul
国家(country): Brazil
运营商(isp): Claro
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.7.194.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.7.194.14. IN A
;; AUTHORITY SECTION:
. 401 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019101402 1800 900 604800 86400
;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 15 03:55:09 CST 2019
;; MSG SIZE rcvd: 116
14.194.7.189.in-addr.arpa domain name pointer bd07c20e.virtua.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.194.7.189.in-addr.arpa name = bd07c20e.virtua.com.br.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.19.109.159 | attack | Unauthorized connection attempt detected from IP address 177.19.109.159 to port 23 |
2020-07-09 07:45:54 |
| 24.130.31.243 | attackspambots | Unauthorized connection attempt detected from IP address 24.130.31.243 to port 22 |
2020-07-09 07:39:03 |
| 170.106.76.152 | attack | Unauthorized connection attempt detected from IP address 170.106.76.152 to port 1503 |
2020-07-09 07:46:14 |
| 183.28.65.254 | attackspam | Unauthorized connection attempt detected from IP address 183.28.65.254 to port 26 |
2020-07-09 08:05:42 |
| 183.250.89.179 | attackspam | Unauthorized connection attempt detected from IP address 183.250.89.179 to port 240 |
2020-07-09 07:44:24 |
| 223.71.167.164 | attack |
|
2020-07-09 08:00:33 |
| 27.77.199.79 | attack | Unauthorized connection attempt detected from IP address 27.77.199.79 to port 23 |
2020-07-09 07:38:46 |
| 212.174.232.150 | attack | Unauthorized connection attempt detected from IP address 212.174.232.150 to port 80 |
2020-07-09 07:41:18 |
| 218.14.53.153 | attack | Unauthorized connection attempt detected from IP address 218.14.53.153 to port 5555 |
2020-07-09 07:40:53 |
| 49.77.58.204 | attackspambots | Unauthorized connection attempt detected from IP address 49.77.58.204 to port 1433 |
2020-07-09 07:35:39 |
| 123.248.45.40 | attack | Unauthorized connection attempt detected from IP address 123.248.45.40 to port 81 |
2020-07-09 07:47:23 |
| 73.21.4.103 | attackbotsspam | Unauthorized connection attempt detected from IP address 73.21.4.103 to port 22 |
2020-07-09 07:33:46 |
| 98.4.118.214 | attack | Unauthorized connection attempt detected from IP address 98.4.118.214 to port 22 |
2020-07-09 07:50:10 |
| 189.61.151.89 | attackbotsspam | Unauthorized connection attempt detected from IP address 189.61.151.89 to port 445 |
2020-07-09 07:43:17 |
| 61.177.172.142 | attack | 2020-07-08T23:31:56.948545shield sshd\[25858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.142 user=root 2020-07-08T23:31:59.298093shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2 2020-07-08T23:32:02.759127shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2 2020-07-08T23:32:05.297370shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2 2020-07-08T23:32:08.583597shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2 |
2020-07-09 07:35:09 |