城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.71.214.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.71.214.74.			IN	A
;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010201 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 03 04:20:02 CST 2022
;; MSG SIZE  rcvd: 106
        74.214.71.106.in-addr.arpa domain name pointer n106-71-214-74.rdl2.qld.optusnet.com.au.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
74.214.71.106.in-addr.arpa	name = n106-71-214-74.rdl2.qld.optusnet.com.au.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 180.76.244.97 | attackbots | Invalid user gulzar from 180.76.244.97 port 33541  | 
                    2019-10-29 07:08:23 | 
| 149.202.45.205 | attackspam | Oct 28 23:41:12 MK-Soft-VM3 sshd[13177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205 Oct 28 23:41:15 MK-Soft-VM3 sshd[13177]: Failed password for invalid user pyg from 149.202.45.205 port 49018 ssh2 ...  | 
                    2019-10-29 06:43:31 | 
| 112.197.0.125 | attackspambots | Oct 28 22:51:36 MK-Soft-VM4 sshd[19586]: Failed password for root from 112.197.0.125 port 17551 ssh2 ...  | 
                    2019-10-29 06:48:50 | 
| 54.36.183.33 | attackspam | $f2bV_matches  | 
                    2019-10-29 06:57:09 | 
| 176.199.253.177 | attackspam | Invalid user alex from 176.199.253.177 port 49565  | 
                    2019-10-29 07:08:44 | 
| 106.13.62.194 | attackspam | Invalid user luke from 106.13.62.194 port 33452  | 
                    2019-10-29 07:14:58 | 
| 106.13.143.189 | attackspam | ssh failed login  | 
                    2019-10-29 06:51:28 | 
| 96.251.179.98 | attackspam | Invalid user developer from 96.251.179.98 port 58564  | 
                    2019-10-29 06:52:39 | 
| 202.39.70.5 | attackspambots | Invalid user zxin10 from 202.39.70.5 port 58984  | 
                    2019-10-29 07:05:16 | 
| 35.201.171.166 | attackspambots | Invalid user zimbra from 35.201.171.166 port 51026  | 
                    2019-10-29 07:00:39 | 
| 103.62.239.77 | attackbots | Invalid user vliaudat from 103.62.239.77 port 57356  | 
                    2019-10-29 07:17:02 | 
| 115.239.253.232 | attack | Invalid user ellie from 115.239.253.232 port 34530  | 
                    2019-10-29 07:13:40 | 
| 118.24.197.243 | attackspam | Invalid user admin from 118.24.197.243 port 36720  | 
                    2019-10-29 06:48:34 | 
| 222.186.175.167 | attack | Oct 28 23:54:07 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2Oct 28 23:54:11 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2Oct 28 23:54:16 apollo sshd\[26562\]: Failed password for root from 222.186.175.167 port 52782 ssh2 ...  | 
                    2019-10-29 07:01:40 | 
| 75.49.249.16 | attackbotsspam | Invalid user User from 75.49.249.16 port 53510  | 
                    2019-10-29 07:19:32 |