城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.199.153.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.199.153.52.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:36:35 CST 2025
;; MSG SIZE  rcvd: 10752.153.199.122.in-addr.arpa domain name pointer static.122-199-153-52.nexg.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
52.153.199.122.in-addr.arpa	name = static.122-199-153-52.nexg.net.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 144.91.83.1 | attackbots | 69/udp [2019-12-24]1pkt | 2019-12-25 01:46:23 | 
| 73.121.188.206 | attackbotsspam | Invalid user xbot from 73.121.188.206 port 47778 | 2019-12-25 01:27:53 | 
| 88.26.231.224 | attackspambots | Dec 24 16:34:09 web2 sshd[19125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.26.231.224 Dec 24 16:34:12 web2 sshd[19125]: Failed password for invalid user galatis from 88.26.231.224 port 49248 ssh2 | 2019-12-25 01:45:06 | 
| 220.132.86.193 | attackbots | 445/tcp [2019-12-24]1pkt | 2019-12-25 01:18:10 | 
| 14.207.171.199 | attack | 1577201672 - 12/24/2019 16:34:32 Host: 14.207.171.199/14.207.171.199 Port: 445 TCP Blocked | 2019-12-25 01:26:03 | 
| 50.60.175.99 | attackspambots | 445/tcp [2019-12-24]1pkt | 2019-12-25 01:21:20 | 
| 78.134.208.126 | attackbots | 1577201665 - 12/24/2019 16:34:25 Host: 78.134.208.126/78.134.208.126 Port: 445 TCP Blocked | 2019-12-25 01:35:20 | 
| 183.177.231.95 | attackspam | Automatic report - SSH Brute-Force Attack | 2019-12-25 01:19:25 | 
| 218.92.0.212 | attackspam | Dec 24 18:17:32 legacy sshd[16942]: Failed password for root from 218.92.0.212 port 40900 ssh2 Dec 24 18:17:47 legacy sshd[16942]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 40900 ssh2 [preauth] Dec 24 18:18:04 legacy sshd[16963]: Failed password for root from 218.92.0.212 port 28541 ssh2 ... | 2019-12-25 01:24:06 | 
| 162.214.14.3 | attackspam | Dec 24 17:36:54 h2177944 sshd\[15442\]: Invalid user drb from 162.214.14.3 port 36596 Dec 24 17:36:54 h2177944 sshd\[15442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.214.14.3 Dec 24 17:36:55 h2177944 sshd\[15442\]: Failed password for invalid user drb from 162.214.14.3 port 36596 ssh2 Dec 24 17:40:06 h2177944 sshd\[15603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.214.14.3 user=root ... | 2019-12-25 01:34:39 | 
| 111.43.223.154 | attackbotsspam | Telnet Server BruteForce Attack | 2019-12-25 01:47:31 | 
| 118.170.49.11 | attackbotsspam | 23/tcp [2019-12-24]1pkt | 2019-12-25 01:41:46 | 
| 176.108.55.41 | attackspambots | 445/tcp [2019-12-24]1pkt | 2019-12-25 01:43:40 | 
| 113.190.229.205 | attackbotsspam | Dec 24 16:34:04 jane sshd[3838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.190.229.205 Dec 24 16:34:06 jane sshd[3838]: Failed password for invalid user administrator from 113.190.229.205 port 59330 ssh2 ... | 2019-12-25 01:50:08 | 
| 61.153.111.217 | attackspam | 1433/tcp 1433/tcp 1433/tcp... [2019-11-16/12-24]11pkt,1pt.(tcp) | 2019-12-25 01:13:33 |