城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.105.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.42.105.128.			IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:18:29 CST 2022
;; MSG SIZE  rcvd: 107
        Host 128.105.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 128.105.42.119.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 165.22.31.24 | attack | xmlrpc attack  | 
                    2020-02-01 09:03:17 | 
| 212.92.124.41 | attackbots | Unauthorized connection attempt detected from IP address 212.92.124.41 to port 3389 [J]  | 
                    2020-02-01 09:09:50 | 
| 193.253.50.137 | attackspambots | Unauthorized connection attempt from IP address 193.253.50.137 on Port 445(SMB)  | 
                    2020-02-01 09:07:21 | 
| 190.28.108.152 | attackspambots | Unauthorized IMAP connection attempt  | 
                    2020-02-01 09:07:51 | 
| 192.99.245.147 | attackbotsspam | Jan 31 22:12:49 Ubuntu-1404-trusty-64-minimal sshd\[22539\]: Invalid user support from 192.99.245.147 Jan 31 22:12:49 Ubuntu-1404-trusty-64-minimal sshd\[22539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.147 Jan 31 22:12:51 Ubuntu-1404-trusty-64-minimal sshd\[22539\]: Failed password for invalid user support from 192.99.245.147 port 35530 ssh2 Jan 31 22:32:05 Ubuntu-1404-trusty-64-minimal sshd\[3369\]: Invalid user testftp from 192.99.245.147 Jan 31 22:32:05 Ubuntu-1404-trusty-64-minimal sshd\[3369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.147  | 
                    2020-02-01 09:13:03 | 
| 46.105.124.52 | attackspam | Unauthorized connection attempt detected from IP address 46.105.124.52 to port 2220 [J]  | 
                    2020-02-01 09:01:19 | 
| 212.64.77.182 | attack | Unauthorized connection attempt detected from IP address 212.64.77.182 to port 2220 [J]  | 
                    2020-02-01 09:02:34 | 
| 40.122.151.131 | attack | Invalid user shashibala from 40.122.151.131 port 35878  | 
                    2020-02-01 08:42:07 | 
| 118.70.124.195 | attackspam | Unauthorized connection attempt from IP address 118.70.124.195 on Port 445(SMB)  | 
                    2020-02-01 09:03:33 | 
| 193.77.81.3 | attack | (imapd) Failed IMAP login from 193.77.81.3 (SI/Slovenia/BSN-77-81-3.static.siol.net): 1 in the last 3600 secs  | 
                    2020-02-01 09:16:50 | 
| 106.54.10.188 | attackspam | Unauthorized connection attempt detected from IP address 106.54.10.188 to port 2220 [J]  | 
                    2020-02-01 09:05:34 | 
| 111.93.140.149 | attack | Invalid user fff from 111.93.140.149 port 62908  | 
                    2020-02-01 09:08:23 | 
| 122.55.79.153 | attack | Unauthorized connection attempt from IP address 122.55.79.153 on Port 445(SMB)  | 
                    2020-02-01 08:47:26 | 
| 206.189.91.97 | attackspam | Unauthorized connection attempt detected from IP address 206.189.91.97 to port 2220 [J]  | 
                    2020-02-01 09:02:55 | 
| 77.247.108.119 | attack | 01/31/2020-19:51:00.473336 77.247.108.119 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-02-01 09:11:20 |