城市(city): Jaipur
省份(region): Rajasthan
国家(country): India
运营商(isp): AirTel
主机名(hostname): unknown
机构(organization): Bharti Airtel Ltd., Telemedia Services
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.161.145.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44927
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.161.145.132. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051502 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 00:30:32 CST 2019
;; MSG SIZE rcvd: 119
132.145.161.122.in-addr.arpa domain name pointer abts-north-dynamic-132.145.161.122.airtelbroadband.in.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
132.145.161.122.in-addr.arpa name = abts-north-dynamic-132.145.161.122.airtelbroadband.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 2001:0002:14:5:1:2:bf35:2610 | spambotsattackproxynormal | Saber información sobre la IP de pantalla |
2024-12-18 16:48:48 |
| 31.31.184.23 | spambotsattackproxynormal | 31.31.184.239 |
2025-01-04 00:32:31 |
| 180.188.227.79 | botsattackproxy | Bad bot |
2024-10-17 20:59:10 |
| 92.38.16.111 | attackproxy | Fraud connect |
2024-12-03 22:19:59 |
| 31.31.184.23 | spam | 31.31.184.239 |
2025-01-04 00:34:26 |
| 183.14.132.22 | attack | 2025-01-05T07:05:40.298024+01:00 vs3301 sshd[58864]: Invalid user xutaosun from 183.14.132.22 port 47160 2025-01-05T07:05:40.540243+01:00 vs3301 sshd[58864]: Connection closed by invalid user xutaosun 183.14.132.22 port 47160 [preauth] 2025-01-05T07:05:41.703654+01:00 vs3301 sshd[58905]: Invalid user sina from 183.14.132.22 port 46826 2025-01-05T07:05:41.944580+01:00 vs3301 sshd[58905]: Connection closed by invalid user sina 183.14.132.22 port 46826 [preauth] 2025-01-05T07:05:42.199024+01:00 vs3301 sshd[58913]: Invalid user zhongnan from 183.14.132.22 port 48656 2025-01-05T07:05:42.451922+01:00 vs3301 sshd[58913]: Connection closed by invalid user zhongnan 183.14.132.22 port 48656 [preauth] |
2025-01-05 18:10:22 |
| 196.207.188.212 | spamattack | Spam ,atac |
2025-01-06 01:17:28 |
| 93.123.85.18 | attackproxy | Malicious IP |
2024-12-05 13:59:16 |
| 180.188.227.79 | attack | Scan port |
2024-10-17 12:43:39 |
| 113.195.224.160 | spam | https://dcshop.biz Heya i'm for the first time here. I found this board and I find It really useful & it helped me out much. I hope to give something back and help others like you helped me. |
2024-12-12 22:05:56 |
| 80.76.51.223 | attack | Хотели взломать |
2025-01-06 19:43:39 |
| 192.168.2.216 | spambotsattacknormal | 15263298866 |
2024-11-06 20:28:21 |
| 64.62.197.156 | spambotsattackproxy | SMB bot |
2024-10-18 13:12:15 |
| 51.195.229.192 | spambotsattackproxy | Malicious IP |
2025-01-02 13:53:42 |
| 152.199.19.158 | botsattackproxy | Exploit scan |
2024-12-09 14:04:05 |