City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
14.207.122.193 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 30-01-2020 04:55:16. |
2020-01-30 21:20:18 |
14.207.122.119 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 01:08:09,853 INFO [shellcode_manager] (14.207.122.119) no match, writing hexdump (0b84678d3b9196bc4c876c0ca50cb3a3 :2130327) - MS17010 (EternalBlue) |
2019-07-02 23:05:33 |
14.207.122.247 | attackspam | firewall-block, port(s): 41878/tcp |
2019-06-30 16:36:39 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.122.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.122.214. IN A
;; AUTHORITY SECTION:
. 135 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:19:46 CST 2022
;; MSG SIZE rcvd: 107
214.122.207.14.in-addr.arpa domain name pointer mx-ll-14.207.122-214.dynamic.3bb.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
214.122.207.14.in-addr.arpa name = mx-ll-14.207.122-214.dynamic.3bb.co.th.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
172.104.242.173 | attack | Port Scan: TCP/1688 |
2019-08-05 09:23:06 |
218.38.28.210 | attackbotsspam | Port Scan: TCP/445 |
2019-08-05 09:08:29 |
208.123.130.60 | attackbotsspam | Port Scan: UDP/137 |
2019-08-05 09:10:13 |
80.82.64.127 | attackbotsspam | 08/04/2019-21:31:31.365801 80.82.64.127 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-08-05 09:37:43 |
5.128.152.227 | attackbots | Port Scan: TCP/23 |
2019-08-05 09:07:43 |
23.240.8.111 | attackbotsspam | Port Scan: UDP/45751 |
2019-08-05 09:06:14 |
193.109.69.76 | attackbots | 3386/tcp 3396/tcp 3390/tcp... [2019-07-26/08-04]11pkt,3pt.(tcp) |
2019-08-05 09:14:52 |
211.103.212.98 | attackbots | Port Scan: UDP/49153 |
2019-08-05 09:09:56 |
181.66.140.208 | attackspambots | Port Scan: TCP/25 |
2019-08-05 09:21:16 |
97.78.131.2 | attack | Port Scan: UDP/137 |
2019-08-05 09:33:24 |
81.22.45.26 | attackbots | 08/04/2019-21:28:52.239072 81.22.45.26 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 79 |
2019-08-05 09:37:22 |
122.114.61.66 | attackspam | Port Scan: TCP/6380 |
2019-08-05 09:26:48 |
60.190.222.170 | attack | Port Scan: TCP/445 |
2019-08-05 08:58:49 |
101.16.139.166 | attack | Port Scan: TCP/2323 |
2019-08-05 09:32:48 |
78.164.77.118 | attack | Honeypot attack, port: 445, PTR: 78.164.77.118.dynamic.ttnet.com.tr. |
2019-08-05 08:56:02 |