City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.207.138.99 | attackbotsspam | Honeypot attack, port: 445, PTR: mx-ll-14.207.138-99.dynamic.3bb.in.th. |
2020-02-08 17:49:59 |
| 14.207.13.222 | attackspam | 2019-11-01T04:50:14.6823061240 sshd\[27897\]: Invalid user ubnt from 14.207.13.222 port 60391 2019-11-01T04:50:14.8890651240 sshd\[27897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.13.222 2019-11-01T04:50:16.4920951240 sshd\[27897\]: Failed password for invalid user ubnt from 14.207.13.222 port 60391 ssh2 ... |
2019-11-01 17:39:49 |
| 14.207.137.59 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 21-10-2019 04:50:18. |
2019-10-21 15:44:17 |
| 14.207.137.221 | attackspambots | Sat, 20 Jul 2019 21:54:11 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 14:03:04 |
| 14.207.136.9 | attack | wordpress exploit scan ... |
2019-07-15 14:54:34 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.13.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.13.166. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:21:35 CST 2022
;; MSG SIZE rcvd: 106
166.13.207.14.in-addr.arpa domain name pointer mx-ll-14.207.13-166.dynamic.3bb.in.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
166.13.207.14.in-addr.arpa name = mx-ll-14.207.13-166.dynamic.3bb.in.th.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.220.172.32 | attackspam | Unauthorized connection attempt detected from IP address 62.220.172.32 to port 23 [J] |
2020-03-01 02:18:32 |
| 220.133.113.69 | attackspam | Unauthorized connection attempt detected from IP address 220.133.113.69 to port 4567 [J] |
2020-03-01 02:27:11 |
| 220.134.190.37 | attack | Unauthorized connection attempt detected from IP address 220.134.190.37 to port 81 [J] |
2020-03-01 02:26:34 |
| 159.65.147.70 | attackbotsspam | Unauthorized connection attempt detected from IP address 159.65.147.70 to port 135 [J] |
2020-03-01 02:36:40 |
| 45.83.66.214 | attackspam | Unauthorized connection attempt detected from IP address 45.83.66.214 to port 22 [J] |
2020-03-01 02:51:48 |
| 114.35.119.3 | attackbotsspam | Unauthorized connection attempt detected from IP address 114.35.119.3 to port 81 [J] |
2020-03-01 02:07:33 |
| 114.34.155.117 | attack | Unauthorized connection attempt detected from IP address 114.34.155.117 to port 80 [J] |
2020-03-01 02:42:58 |
| 124.156.62.138 | attackspam | Unauthorized connection attempt detected from IP address 124.156.62.138 to port 902 [J] |
2020-03-01 02:37:41 |
| 45.173.78.34 | attack | Unauthorized connection attempt detected from IP address 45.173.78.34 to port 23 [J] |
2020-03-01 02:21:39 |
| 121.199.1.237 | attackspambots | Unauthorized connection attempt detected from IP address 121.199.1.237 to port 1433 [J] |
2020-03-01 02:39:37 |
| 103.52.216.52 | attackbots | Unauthorized connection attempt detected from IP address 103.52.216.52 to port 2604 [J] |
2020-03-01 02:10:50 |
| 115.49.46.146 | attackbots | Unauthorized connection attempt detected from IP address 115.49.46.146 to port 23 [J] |
2020-03-01 02:07:00 |
| 213.14.191.94 | attackbots | Unauthorized connection attempt detected from IP address 213.14.191.94 to port 81 [J] |
2020-03-01 02:28:47 |
| 46.201.253.122 | attack | Unauthorized connection attempt detected from IP address 46.201.253.122 to port 23 [J] |
2020-03-01 02:50:39 |
| 96.9.79.75 | attackspambots | Unauthorized connection attempt detected from IP address 96.9.79.75 to port 8080 [J] |
2020-03-01 02:11:23 |