城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.114.142.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.114.142.97.			IN	A
;; AUTHORITY SECTION:
.			226	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:21:20 CST 2022
;; MSG SIZE  rcvd: 107
        Host 97.142.114.122.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 97.142.114.122.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 27.78.14.83 | attackspam | " "  | 
                    2020-06-01 03:29:10 | 
| 92.53.65.40 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 3717 proto: TCP cat: Misc Attack  | 
                    2020-06-01 03:40:34 | 
| 216.154.4.207 | attack | ET EXPLOIT Zyxel NAS RCE Attempt Inbound (CVE-2020-9054) M1 - port: 80 proto: TCP cat: Attempted Administrator Privilege Gain  | 
                    2020-06-01 03:30:53 | 
| 103.91.181.25 | attackspambots | (sshd) Failed SSH login from 103.91.181.25 (IN/India/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 31 19:42:00 ubnt-55d23 sshd[28096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.181.25 user=root May 31 19:42:02 ubnt-55d23 sshd[28096]: Failed password for root from 103.91.181.25 port 55690 ssh2  | 
                    2020-06-01 03:05:42 | 
| 200.114.236.19 | attackspambots | SSH Brute Force  | 
                    2020-06-01 03:08:46 | 
| 129.211.185.246 | attackspam | Unauthorized SSH login attempts  | 
                    2020-06-01 03:19:04 | 
| 106.13.47.78 | attackbots | SSH Brute Force  | 
                    2020-06-01 03:24:30 | 
| 185.200.118.49 | attackbotsspam | 
  | 
                    2020-06-01 03:34:19 | 
| 189.180.11.233 | attackbots | May 31 09:01:04 v11 sshd[30031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.180.11.233 user=clamav May 31 09:01:06 v11 sshd[30031]: Failed password for clamav from 189.180.11.233 port 41004 ssh2 May 31 09:01:06 v11 sshd[30031]: Received disconnect from 189.180.11.233 port 41004:11: Bye Bye [preauth] May 31 09:01:06 v11 sshd[30031]: Disconnected from 189.180.11.233 port 41004 [preauth] May 31 09:07:34 v11 sshd[30332]: Invalid user plcmspip from 189.180.11.233 port 38026 May 31 09:07:36 v11 sshd[30332]: Failed password for invalid user plcmspip from 189.180.11.233 port 38026 ssh2 May 31 09:07:36 v11 sshd[30332]: Received disconnect from 189.180.11.233 port 38026:11: Bye Bye [preauth] May 31 09:07:36 v11 sshd[30332]: Disconnected from 189.180.11.233 port 38026 [preauth] May 31 09:09:46 v11 sshd[30760]: Invalid user test from 189.180.11.233 port 57984 May 31 09:09:49 v11 sshd[30760]: Failed password for invalid user test fro........ -------------------------------  | 
                    2020-06-01 03:10:37 | 
| 89.218.155.75 | attack | Port Scan detected! ...  | 
                    2020-06-01 03:41:41 | 
| 103.253.146.142 | attackspam | Port scan denied  | 
                    2020-06-01 03:37:47 | 
| 213.217.0.205 | attack | Port scanning [2 denied]  | 
                    2020-06-01 03:31:14 | 
| 120.132.13.151 | attack | May 31 15:36:45 pkdns2 sshd\[4622\]: Invalid user karsan from 120.132.13.151May 31 15:36:47 pkdns2 sshd\[4622\]: Failed password for invalid user karsan from 120.132.13.151 port 45252 ssh2May 31 15:39:55 pkdns2 sshd\[4731\]: Invalid user ot from 120.132.13.151May 31 15:39:57 pkdns2 sshd\[4731\]: Failed password for invalid user ot from 120.132.13.151 port 49746 ssh2May 31 15:46:24 pkdns2 sshd\[5216\]: Invalid user zeenat from 120.132.13.151May 31 15:46:26 pkdns2 sshd\[5216\]: Failed password for invalid user zeenat from 120.132.13.151 port 58738 ssh2 ...  | 
                    2020-06-01 03:21:11 | 
| 157.245.207.198 | attackspambots | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)  | 
                    2020-06-01 03:16:41 | 
| 178.128.242.233 | attack | 2020-05-30 17:05:03 server sshd[22140]: Failed password for invalid user root from 178.128.242.233 port 37756 ssh2  | 
                    2020-06-01 03:12:16 |