城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.114.141.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.114.141.85. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:28:27 CST 2025
;; MSG SIZE rcvd: 106
85.141.114.94.in-addr.arpa domain name pointer ip-094-114-141-085.um31.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
85.141.114.94.in-addr.arpa name = ip-094-114-141-085.um31.pools.vodafone-ip.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 150.129.121.17 | attackspam | Unauthorized connection attempt from IP address 150.129.121.17 on Port 445(SMB) |
2019-09-27 04:24:47 |
| 95.0.57.126 | attackspambots | Unauthorized connection attempt from IP address 95.0.57.126 on Port 445(SMB) |
2019-09-27 04:13:10 |
| 174.49.48.61 | attack | 2019-09-26T19:52:27.950233abusebot-4.cloudsearch.cf sshd\[13197\]: Invalid user hsu from 174.49.48.61 port 35756 |
2019-09-27 03:52:43 |
| 139.59.95.216 | attack | detected by Fail2Ban |
2019-09-27 04:00:28 |
| 167.71.204.94 | attackspam | *Port Scan* detected from 167.71.204.94 (SG/Singapore/-). 4 hits in the last 165 seconds |
2019-09-27 04:19:25 |
| 88.214.26.17 | attackspam | DATE:2019-09-26 20:22:34, IP:88.214.26.17, PORT:3306 SQL brute force auth on honeypot MySQL/MariaDB server (honey-neo-dc) |
2019-09-27 04:19:46 |
| 113.231.82.230 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-09-27 03:51:36 |
| 222.186.180.8 | attackspambots | 2019-09-26T22:18:20.1832581240 sshd\[30944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root 2019-09-26T22:18:22.3109661240 sshd\[30944\]: Failed password for root from 222.186.180.8 port 5740 ssh2 2019-09-26T22:18:26.9177531240 sshd\[30944\]: Failed password for root from 222.186.180.8 port 5740 ssh2 ... |
2019-09-27 04:26:31 |
| 117.2.44.203 | attackbotsspam | Unauthorized connection attempt from IP address 117.2.44.203 on Port 445(SMB) |
2019-09-27 03:49:08 |
| 103.55.91.51 | attackbots | Invalid user a from 103.55.91.51 port 55812 |
2019-09-27 04:01:16 |
| 36.90.156.236 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-09-27 03:54:45 |
| 60.220.230.21 | attack | Sep 26 20:14:08 mail1 sshd\[17411\]: Invalid user adminttd from 60.220.230.21 port 34255 Sep 26 20:14:08 mail1 sshd\[17411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21 Sep 26 20:14:11 mail1 sshd\[17411\]: Failed password for invalid user adminttd from 60.220.230.21 port 34255 ssh2 Sep 26 20:21:56 mail1 sshd\[21031\]: Invalid user boon from 60.220.230.21 port 34200 Sep 26 20:21:56 mail1 sshd\[21031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21 ... |
2019-09-27 03:57:23 |
| 213.55.92.50 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 16:31:00. |
2019-09-27 04:20:36 |
| 142.93.251.1 | attackbotsspam | SSH Brute Force |
2019-09-27 04:00:01 |
| 49.206.25.57 | attackbots | Unauthorized connection attempt from IP address 49.206.25.57 on Port 445(SMB) |
2019-09-27 03:58:21 |