城市(city): Shenzhen
省份(region): Guangdong
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.153.41.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.153.41.148.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 01 17:33:27 CST 2025
;; MSG SIZE  rcvd: 106
        Host 148.41.153.14.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 148.41.153.14.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 71.6.233.236 | attack | 4001/tcp 8820/tcp 8181/tcp [2019-12-29/2020-01-24]3pkt  | 
                    2020-01-24 22:46:35 | 
| 14.160.20.50 | attackspambots | Unauthorized connection attempt from IP address 14.160.20.50 on Port 445(SMB)  | 
                    2020-01-24 23:13:35 | 
| 216.218.206.109 | attack | 30005/tcp 7547/tcp 27017/tcp... [2019-11-24/2020-01-24]33pkt,6pt.(tcp),2pt.(udp)  | 
                    2020-01-24 22:49:08 | 
| 107.175.38.109 | attackbotsspam | 01/24/2020-08:24:14.943139 107.175.38.109 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-01-24 23:22:28 | 
| 148.244.87.23 | attackspam | Unauthorized connection attempt from IP address 148.244.87.23 on Port 445(SMB)  | 
                    2020-01-24 23:14:39 | 
| 49.212.36.229 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -  | 
                    2020-01-24 22:54:20 | 
| 69.229.6.42 | attackspam | Jan 24 15:22:48 OPSO sshd\[15750\]: Invalid user cuc from 69.229.6.42 port 56662 Jan 24 15:22:48 OPSO sshd\[15750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.42 Jan 24 15:22:50 OPSO sshd\[15750\]: Failed password for invalid user cuc from 69.229.6.42 port 56662 ssh2 Jan 24 15:26:32 OPSO sshd\[16634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.42 user=root Jan 24 15:26:35 OPSO sshd\[16634\]: Failed password for root from 69.229.6.42 port 51668 ssh2  | 
                    2020-01-24 23:27:45 | 
| 222.186.175.215 | attackbots | 2020-01-24T14:44:46.071133shield sshd\[22815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root 2020-01-24T14:44:48.444480shield sshd\[22815\]: Failed password for root from 222.186.175.215 port 12428 ssh2 2020-01-24T14:44:51.824431shield sshd\[22815\]: Failed password for root from 222.186.175.215 port 12428 ssh2 2020-01-24T14:44:55.609621shield sshd\[22815\]: Failed password for root from 222.186.175.215 port 12428 ssh2 2020-01-24T14:44:59.283518shield sshd\[22815\]: Failed password for root from 222.186.175.215 port 12428 ssh2  | 
                    2020-01-24 23:01:09 | 
| 5.135.224.152 | attackspam | Jan 24 17:46:00 hosting sshd[14730]: Invalid user valeria from 5.135.224.152 port 51592 ...  | 
                    2020-01-24 22:57:05 | 
| 46.217.118.230 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -  | 
                    2020-01-24 23:04:09 | 
| 54.90.116.219 | attackspam | SIP/5060 Probe, BF, Hack -  | 
                    2020-01-24 23:22:55 | 
| 139.215.136.79 | attack | 13002/udp [2020-01-23]1pkt  | 
                    2020-01-24 23:11:58 | 
| 139.162.122.110 | attackbots | Unauthorized connection attempt detected from IP address 139.162.122.110 to port 22 [J]  | 
                    2020-01-24 22:58:40 | 
| 158.140.174.157 | attackspambots | 37215/tcp [2020-01-24]1pkt  | 
                    2020-01-24 23:14:24 | 
| 118.98.96.184 | attack | Unauthorized connection attempt detected from IP address 118.98.96.184 to port 2220 [J]  | 
                    2020-01-24 23:25:34 |