城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 155.212.208.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;155.212.208.19.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:40:44 CST 2025
;; MSG SIZE  rcvd: 10719.208.212.155.in-addr.arpa domain name pointer static-155-212-208-19.mas.onecommunications.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
19.208.212.155.in-addr.arpa	name = static-155-212-208-19.mas.onecommunications.net.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 37.53.76.27 | attack | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-04-13 23:18:46 | 
| 183.89.171.243 | attack | 1586767262 - 04/13/2020 10:41:02 Host: 183.89.171.243/183.89.171.243 Port: 445 TCP Blocked | 2020-04-13 23:02:21 | 
| 221.163.107.71 | attack | 23/tcp 23/tcp [2020-02-25/04-13]2pkt | 2020-04-13 23:27:07 | 
| 186.168.10.222 | attackspambots | (sshd) Failed SSH login from 186.168.10.222 (CO/Colombia/-): 5 in the last 3600 secs | 2020-04-13 22:54:51 | 
| 80.82.64.73 | attackspambots | Apr 13 15:05:54 debian-2gb-nbg1-2 kernel: \[9042148.758166\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.64.73 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=28353 PROTO=TCP SPT=52212 DPT=1796 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-04-13 23:01:11 | 
| 186.225.148.18 | attackspambots | port 23 | 2020-04-13 23:25:10 | 
| 185.142.236.35 | attackbots | Report Port Scan: Events[2] countPorts[2]: 2121 4567 .. | 2020-04-13 22:52:01 | 
| 142.93.245.44 | attackbots | DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks UA removed | 2020-04-13 23:14:01 | 
| 211.232.116.144 | attackspambots | Automatic report - Banned IP Access | 2020-04-13 22:59:24 | 
| 192.162.248.5 | attack | 2020-04-13 09:07:23,832 [snip] proftpd[18588] [snip] (192.162.248.5[192.162.248.5]): USER admin: no such user found from 192.162.248.5 [192.162.248.5] to ::ffff:[snip]:22 2020-04-13 09:30:42,266 [snip] proftpd[21319] [snip] (192.162.248.5[192.162.248.5]): USER test: no such user found from 192.162.248.5 [192.162.248.5] to ::ffff:[snip]:22 2020-04-13 09:54:01,096 [snip] proftpd[23984] [snip] (192.162.248.5[192.162.248.5]): USER ftp: no such user found from 192.162.248.5 [192.162.248.5] to ::ffff:[snip]:22 2020-04-13 10:17:38,905 [snip] proftpd[26668] [snip] (192.162.248.5[192.162.248.5]): USER root: no such user found from 192.162.248.5 [192.162.248.5] to ::ffff:[snip]:22 2020-04-13 10:40:46,403 [snip] proftpd[29286] [snip] (192.162.248.5[192.162.248.5]): USER admin: no such user found from 192.162.248.5 [192.162.248.5] to ::ffff:[snip]:22[...] | 2020-04-13 23:27:27 | 
| 171.232.157.215 | attack | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-04-13 22:59:40 | 
| 71.6.146.185 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 8889 proto: TCP cat: Misc Attack | 2020-04-13 22:51:17 | 
| 163.44.151.51 | attackspambots | $f2bV_matches | 2020-04-13 23:25:29 | 
| 106.75.231.150 | attackspam | 2020-04-13T14:54:23.161460vps773228.ovh.net sshd[28095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.150 2020-04-13T14:54:23.152813vps773228.ovh.net sshd[28095]: Invalid user jenny from 106.75.231.150 port 53052 2020-04-13T14:54:25.862387vps773228.ovh.net sshd[28095]: Failed password for invalid user jenny from 106.75.231.150 port 53052 ssh2 2020-04-13T14:59:44.897899vps773228.ovh.net sshd[30081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.150 user=root 2020-04-13T14:59:47.333939vps773228.ovh.net sshd[30081]: Failed password for root from 106.75.231.150 port 49788 ssh2 ... | 2020-04-13 23:07:52 | 
| 194.26.29.120 | attackbotsspam | 19926/tcp 19560/tcp 19720/tcp... [2020-03-25/04-12]1063pkt,772pt.(tcp) | 2020-04-13 23:07:19 |