城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.187.103.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.187.103.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:10:54 CST 2025
;; MSG SIZE rcvd: 107
14.103.187.203.in-addr.arpa domain name pointer host-203-187-103-14.ip.kbtelecom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.103.187.203.in-addr.arpa name = host-203-187-103-14.ip.kbtelecom.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.222.204.120 | attack | Jan 10 20:33:00 debian-2gb-nbg1-2 kernel: \[944089.901703\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.222.204.120 DST=195.201.40.59 LEN=439 TOS=0x18 PREC=0x00 TTL=52 ID=34567 DF PROTO=UDP SPT=5086 DPT=5060 LEN=419 |
2020-01-11 04:03:14 |
| 104.131.15.189 | attack | Brute-force attempt banned |
2020-01-11 04:14:51 |
| 178.46.209.44 | attackbotsspam | unauthorized connection attempt |
2020-01-11 03:56:00 |
| 176.58.137.29 | attackspambots | Fail2Ban Ban Triggered |
2020-01-11 04:20:43 |
| 177.139.177.94 | attack | Jan 10 05:41:18 web9 sshd\[23773\]: Invalid user txk from 177.139.177.94 Jan 10 05:41:18 web9 sshd\[23773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.177.94 Jan 10 05:41:19 web9 sshd\[23773\]: Failed password for invalid user txk from 177.139.177.94 port 51004 ssh2 Jan 10 05:45:12 web9 sshd\[24494\]: Invalid user oracle from 177.139.177.94 Jan 10 05:45:12 web9 sshd\[24494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.177.94 |
2020-01-11 04:06:30 |
| 197.248.80.2 | attack | Jan 10 13:52:22 grey postfix/smtpd\[26125\]: NOQUEUE: reject: RCPT from unknown\[197.248.80.2\]: 554 5.7.1 Service unavailable\; Client host \[197.248.80.2\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[197.248.80.2\]\; from=\ |
2020-01-11 04:09:13 |
| 118.46.132.117 | attackbotsspam | Jan 10 20:13:00 grey postfix/smtpd\[29963\]: NOQUEUE: reject: RCPT from unknown\[118.46.132.117\]: 554 5.7.1 Service unavailable\; Client host \[118.46.132.117\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[118.46.132.117\]\; from=\ |
2020-01-11 03:52:04 |
| 185.175.93.14 | attackspam | 01/10/2020-20:00:31.630376 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-11 04:08:13 |
| 41.138.220.67 | attack | Jan 10 16:13:41 *** sshd[3087]: Invalid user deploy from 41.138.220.67 |
2020-01-11 03:53:32 |
| 118.98.121.195 | attackspambots | Jan 6 sshd[6020]: Invalid user cug from 118.98.121.195 port 40830 |
2020-01-11 04:08:54 |
| 124.156.160.69 | attackbotsspam | WEB SQL injection attempt -1.b |
2020-01-11 03:47:57 |
| 89.248.172.85 | attackspambots | Multiport scan : 16 ports scanned 1235 1240 1253 1289 1318 1390 1421 1422 1506 1516 1520 1540 12354 33090 33391 33394 |
2020-01-11 04:00:34 |
| 82.185.164.127 | attack | Unauthorized connection attempt detected from IP address 82.185.164.127 to port 80 |
2020-01-11 03:48:37 |
| 141.105.120.187 | attackbotsspam | Port 123/UDP : GPL EXPLOIT ntpdx overflow attempt |
2020-01-11 03:56:23 |
| 104.200.137.189 | attackbots | $f2bV_matches |
2020-01-11 04:19:28 |