城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.14.97.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;206.14.97.194.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 11:37:23 CST 2025
;; MSG SIZE  rcvd: 106Host 194.97.14.206.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 194.97.14.206.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 117.7.214.83 | attack | Unauthorized connection attempt from IP address 117.7.214.83 on Port 445(SMB) | 2020-08-19 23:15:03 | 
| 61.151.130.22 | attackspam | Triggered: repeated knocking on closed ports. | 2020-08-19 23:55:35 | 
| 60.169.204.100 | attack | spam (f2b h2) | 2020-08-19 23:21:07 | 
| 58.49.76.100 | attackspam | 2020-08-19T14:14:30.431055shield sshd\[6703\]: Invalid user ems from 58.49.76.100 port 43967 2020-08-19T14:14:30.439171shield sshd\[6703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.49.76.100 2020-08-19T14:14:32.604603shield sshd\[6703\]: Failed password for invalid user ems from 58.49.76.100 port 43967 ssh2 2020-08-19T14:17:02.577859shield sshd\[6862\]: Invalid user ts1 from 58.49.76.100 port 32921 2020-08-19T14:17:02.586111shield sshd\[6862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.49.76.100 | 2020-08-19 23:12:16 | 
| 202.21.123.185 | attack | Aug 19 22:38:27 localhost sshd[1661656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.21.123.185 user=root Aug 19 22:38:29 localhost sshd[1661656]: Failed password for root from 202.21.123.185 port 52392 ssh2 ... | 2020-08-19 23:42:12 | 
| 159.89.47.115 | attackspambots | firewall-block, port(s): 17914/tcp | 2020-08-19 23:46:30 | 
| 49.146.49.32 | attackbots | Unauthorized connection attempt from IP address 49.146.49.32 on Port 445(SMB) | 2020-08-19 23:28:42 | 
| 173.218.64.122 | attackbotsspam | Aug 19 09:28:08 ws12vmsma01 sshd[58784]: Invalid user admin from 173.218.64.122 Aug 19 09:28:10 ws12vmsma01 sshd[58784]: Failed password for invalid user admin from 173.218.64.122 port 34557 ssh2 Aug 19 09:28:11 ws12vmsma01 sshd[58794]: Invalid user admin from 173.218.64.122 ... | 2020-08-19 23:22:34 | 
| 51.178.78.154 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 40 - port: 6001 proto: tcp cat: Misc Attackbytes: 60 | 2020-08-19 23:53:58 | 
| 159.89.167.80 | attackspam | firewall-block, port(s): 8443/tcp | 2020-08-19 23:43:07 | 
| 46.229.168.161 | attackspambots | Mailserver and mailaccount attacks | 2020-08-19 23:36:26 | 
| 171.247.139.234 | attackspambots | Unauthorized connection attempt from IP address 171.247.139.234 on Port 445(SMB) | 2020-08-19 23:42:40 | 
| 183.171.69.76 | attackbots | Unauthorized connection attempt from IP address 183.171.69.76 on Port 445(SMB) | 2020-08-19 23:22:03 | 
| 140.238.253.177 | attack | $f2bV_matches | 2020-08-19 23:14:25 | 
| 165.22.76.96 | attackbotsspam | Aug 19 16:46:37 PorscheCustomer sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.76.96 Aug 19 16:46:40 PorscheCustomer sshd[5323]: Failed password for invalid user demo from 165.22.76.96 port 48464 ssh2 Aug 19 16:50:37 PorscheCustomer sshd[5408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.76.96 ... | 2020-08-19 23:13:12 |