城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.216.68.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;64.216.68.14. IN A
;; AUTHORITY SECTION:
. 406 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019101402 1800 900 604800 86400
;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 15 03:17:12 CST 2019
;; MSG SIZE rcvd: 116
14.68.216.64.in-addr.arpa domain name pointer adsl-64-216-68-14.dsl.hstntx.swbell.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.68.216.64.in-addr.arpa name = adsl-64-216-68-14.dsl.hstntx.swbell.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
186.225.100.74 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-14 21:38:20 |
180.183.101.221 | attack | 1581655795 - 02/14/2020 05:49:55 Host: 180.183.101.221/180.183.101.221 Port: 445 TCP Blocked |
2020-02-14 21:34:06 |
106.12.156.160 | attackbotsspam | Feb 14 13:30:34 lnxded64 sshd[16468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.160 |
2020-02-14 21:23:08 |
206.189.114.0 | attackbotsspam | Feb 14 14:21:31 markkoudstaal sshd[22457]: Failed password for root from 206.189.114.0 port 51800 ssh2 Feb 14 14:22:53 markkoudstaal sshd[22696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.114.0 Feb 14 14:22:55 markkoudstaal sshd[22696]: Failed password for invalid user tssbot from 206.189.114.0 port 36238 ssh2 |
2020-02-14 21:28:21 |
189.57.88.130 | attackbotsspam | SSH login attempts |
2020-02-14 21:09:51 |
61.221.66.173 | attackbots | 1581655796 - 02/14/2020 05:49:56 Host: 61.221.66.173/61.221.66.173 Port: 445 TCP Blocked |
2020-02-14 21:32:12 |
40.118.202.136 | attack | Automatic report - XMLRPC Attack |
2020-02-14 21:25:04 |
188.0.131.219 | attackbots | Unauthorised access (Feb 14) SRC=188.0.131.219 LEN=52 TTL=117 ID=11136 DF TCP DPT=445 WINDOW=8192 SYN |
2020-02-14 21:33:02 |
194.28.61.39 | attackbots | RDPBruteGSL24 |
2020-02-14 21:01:42 |
59.148.90.92 | attackspambots | Honeypot attack, port: 5555, PTR: 059148090092.ctinets.com. |
2020-02-14 21:39:45 |
59.126.34.141 | attack | Honeypot attack, port: 81, PTR: 59-126-34-141.HINET-IP.hinet.net. |
2020-02-14 21:14:27 |
119.201.171.192 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 21:17:45 |
217.182.196.178 | attackbotsspam | Feb 14 09:25:44 l02a sshd[3012]: Invalid user thea from 217.182.196.178 Feb 14 09:25:44 l02a sshd[3012]: Invalid user thea from 217.182.196.178 Feb 14 09:25:45 l02a sshd[3012]: Failed password for invalid user thea from 217.182.196.178 port 43856 ssh2 |
2020-02-14 21:21:22 |
104.206.128.74 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 21:23:27 |
1.52.174.246 | attack | Unauthorized connection attempt detected from IP address 1.52.174.246 to port 445 |
2020-02-14 21:45:22 |