城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.199.172.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.199.172.103.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:05:57 CST 2025
;; MSG SIZE  rcvd: 108Host 103.172.199.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.199.172.103.in-addr.arpa: SERVFAIL| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 18.184.155.204 | attack | C1,WP GET /chicken-house/wp-login.php | 2020-01-01 07:03:23 | 
| 222.186.169.192 | attackbots | recidive jail | 2020-01-01 07:05:50 | 
| 112.85.42.176 | attack | Dec 31 23:55:31 silence02 sshd[15006]: Failed password for root from 112.85.42.176 port 8359 ssh2 Dec 31 23:55:45 silence02 sshd[15006]: Failed password for root from 112.85.42.176 port 8359 ssh2 Dec 31 23:55:45 silence02 sshd[15006]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 8359 ssh2 [preauth] | 2020-01-01 06:58:19 | 
| 5.135.198.62 | attackbotsspam | Invalid user cfdtest from 5.135.198.62 port 43117 | 2020-01-01 07:09:27 | 
| 54.145.217.64 | attackspam | 54.145.217.64 was recorded 5 times by 2 hosts attempting to connect to the following ports: 53,91,25471,86,5004. Incident counter (4h, 24h, all-time): 5, 5, 26 | 2020-01-01 06:40:48 | 
| 79.127.103.217 | attackbotsspam | Unauthorized connection attempt from IP address 79.127.103.217 on Port 445(SMB) | 2020-01-01 06:50:47 | 
| 222.186.175.147 | attackbotsspam | Dec 31 23:53:22 meumeu sshd[16021]: Failed password for root from 222.186.175.147 port 15134 ssh2 Dec 31 23:53:38 meumeu sshd[16021]: error: maximum authentication attempts exceeded for root from 222.186.175.147 port 15134 ssh2 [preauth] Dec 31 23:53:43 meumeu sshd[16055]: Failed password for root from 222.186.175.147 port 38110 ssh2 ... | 2020-01-01 06:56:50 | 
| 112.35.76.1 | attackbots | Dec 31 22:59:26 MK-Soft-VM7 sshd[32000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.76.1 Dec 31 22:59:29 MK-Soft-VM7 sshd[32000]: Failed password for invalid user quandt from 112.35.76.1 port 48506 ssh2 ... | 2020-01-01 06:52:15 | 
| 112.85.42.194 | attackbots | k+ssh-bruteforce | 2020-01-01 06:57:15 | 
| 95.66.206.68 | attackbots | Unauthorized connection attempt detected from IP address 95.66.206.68 to port 1433 | 2020-01-01 07:08:29 | 
| 200.111.46.93 | attackbotsspam | Unauthorized connection attempt from IP address 200.111.46.93 on Port 445(SMB) | 2020-01-01 06:43:27 | 
| 121.161.254.198 | attackspambots | " " | 2020-01-01 07:09:06 | 
| 112.85.42.173 | attackspambots | 19/12/31@17:40:39: FAIL: IoT-SSH address from=112.85.42.173 ... | 2020-01-01 06:44:42 | 
| 139.199.248.156 | attackbotsspam | Dec 31 23:53:05 pornomens sshd\[26170\]: Invalid user kddi from 139.199.248.156 port 36085 Dec 31 23:53:05 pornomens sshd\[26170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.156 Dec 31 23:53:06 pornomens sshd\[26170\]: Failed password for invalid user kddi from 139.199.248.156 port 36085 ssh2 ... | 2020-01-01 07:11:12 | 
| 106.12.57.38 | attack | Invalid user py from 106.12.57.38 port 58700 | 2020-01-01 07:03:51 |