城市(city): unknown
省份(region): unknown
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.144.3.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.144.3.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 17:25:05 CST 2025
;; MSG SIZE rcvd: 104
214.3.144.5.in-addr.arpa domain name pointer 214-3-144-5.dyn.cable.qlnet.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
214.3.144.5.in-addr.arpa name = 214-3-144-5.dyn.cable.qlnet.ch.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.166.2.204 | attackspam | Unauthorised access (Nov 20) SRC=14.166.2.204 LEN=52 TTL=111 ID=5733 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-20 23:08:50 |
| 129.211.10.228 | attackspambots | Nov 20 17:41:21 server sshd\[10005\]: Invalid user wans from 129.211.10.228 Nov 20 17:41:21 server sshd\[10005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.10.228 Nov 20 17:41:23 server sshd\[10005\]: Failed password for invalid user wans from 129.211.10.228 port 42722 ssh2 Nov 20 17:47:02 server sshd\[11335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.10.228 user=root Nov 20 17:47:05 server sshd\[11335\]: Failed password for root from 129.211.10.228 port 28082 ssh2 ... |
2019-11-20 22:49:58 |
| 216.169.91.106 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-20 22:43:16 |
| 109.196.217.41 | attack | Unauthorized connection attempt from IP address 109.196.217.41 on Port 445(SMB) |
2019-11-20 23:08:10 |
| 124.156.172.11 | attackspam | Nov 20 15:47:03 MK-Soft-VM5 sshd[19196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.172.11 Nov 20 15:47:05 MK-Soft-VM5 sshd[19196]: Failed password for invalid user server from 124.156.172.11 port 51568 ssh2 ... |
2019-11-20 22:50:21 |
| 187.68.197.25 | attack | Unauthorized connection attempt from IP address 187.68.197.25 on Port 445(SMB) |
2019-11-20 22:56:03 |
| 190.121.21.158 | attack | Port Scan 1433 |
2019-11-20 22:48:36 |
| 129.204.58.180 | attackbotsspam | Nov 20 04:12:24 mail sshd\[63792\]: Invalid user zhr from 129.204.58.180 Nov 20 04:12:24 mail sshd\[63792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180 ... |
2019-11-20 22:36:39 |
| 175.154.203.70 | attackspam | badbot |
2019-11-20 22:33:23 |
| 111.231.71.157 | attackbotsspam | Nov 20 11:26:26 ns382633 sshd\[26938\]: Invalid user makayla from 111.231.71.157 port 34164 Nov 20 11:26:26 ns382633 sshd\[26938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 Nov 20 11:26:28 ns382633 sshd\[26938\]: Failed password for invalid user makayla from 111.231.71.157 port 34164 ssh2 Nov 20 11:38:21 ns382633 sshd\[29040\]: Invalid user juwaan from 111.231.71.157 port 51580 Nov 20 11:38:21 ns382633 sshd\[29040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 |
2019-11-20 22:41:22 |
| 184.75.211.131 | attackspam | (From mohamed.spence@outlook.com) Need to find powerful online marketing that isn't full of crap? Sorry to bug you on your contact form but actually that was kinda the point. We can send your advertising text to sites through their contact forms just like you're getting this note right now. You can specify targets by keyword or just start mass blasts to sites in any country you choose. So let's assume you want to blast an ad to all the contractors in the USA, we'll grab websites for just those and post your promo to them. As long as you're advertising something that's relevant to that business category then you'll get an amazing response! Write a quick note to eliza3644will@gmail.com to get info and prices |
2019-11-20 22:34:29 |
| 203.121.77.2 | attackbotsspam | Unauthorized connection attempt from IP address 203.121.77.2 on Port 445(SMB) |
2019-11-20 23:02:29 |
| 119.29.114.235 | attack | Automatic report - Banned IP Access |
2019-11-20 22:40:50 |
| 83.226.201.18 | attackbotsspam | Connection by 83.226.201.18 on port: 23 got caught by honeypot at 11/20/2019 5:19:12 AM |
2019-11-20 22:32:39 |
| 77.28.61.199 | attackbots | 2019-11-20 14:35:29 H=([77.28.61.199]) [77.28.61.199]:33706 I=[10.100.18.23]:25 F= |
2019-11-20 22:57:13 |