城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.94.119.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.94.119.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 08:48:01 CST 2025
;; MSG SIZE rcvd: 107
b'Host 169.119.94.142.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 169.119.94.142.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
188.136.223.196 | attackbots | Autoban 188.136.223.196 AUTH/CONNECT |
2019-07-22 10:29:06 |
188.218.176.107 | attack | Autoban 188.218.176.107 AUTH/CONNECT |
2019-07-22 10:15:10 |
187.92.175.52 | attackspambots | Autoban 187.92.175.52 AUTH/CONNECT |
2019-07-22 10:35:57 |
187.87.10.139 | attackbots | Autoban 187.87.10.139 AUTH/CONNECT |
2019-07-22 10:40:29 |
188.152.168.50 | attackbots | Autoban 188.152.168.50 AUTH/CONNECT |
2019-07-22 10:23:37 |
188.250.197.127 | attackbots | Autoban 188.250.197.127 AUTH/CONNECT |
2019-07-22 10:11:43 |
187.95.236.246 | attack | Autoban 187.95.236.246 AUTH/CONNECT |
2019-07-22 10:34:32 |
187.243.253.182 | attackbots | proto=tcp . spt=35986 . dpt=25 . (listed on Blocklist de Jul 21) (211) |
2019-07-22 10:53:36 |
187.45.154.47 | attackspam | Autoban 187.45.154.47 AUTH/CONNECT |
2019-07-22 10:45:55 |
104.206.128.70 | attackspam | 19/7/21@14:54:30: FAIL: Alarm-Intrusion address from=104.206.128.70 ... |
2019-07-22 10:12:38 |
188.225.179.86 | attack | Autoban 188.225.179.86 AUTH/CONNECT |
2019-07-22 10:14:46 |
51.255.35.58 | attackspambots | Jul 22 04:38:05 srv03 sshd\[3623\]: Invalid user test from 51.255.35.58 port 36399 Jul 22 04:38:05 srv03 sshd\[3623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58 Jul 22 04:38:07 srv03 sshd\[3623\]: Failed password for invalid user test from 51.255.35.58 port 36399 ssh2 |
2019-07-22 10:43:04 |
188.162.166.248 | attackspam | Autoban 188.162.166.248 AUTH/CONNECT |
2019-07-22 10:19:42 |
218.60.67.16 | attackspam | 60001/tcp 3389/tcp 1433/tcp... [2019-05-24/07-21]23pkt,4pt.(tcp) |
2019-07-22 10:31:17 |
113.190.242.144 | attackspam | Port scan attempt detected by AWS-CCS, CTS, India |
2019-07-22 10:40:12 |