城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.64.123.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.64.123.142.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:40:12 CST 2025
;; MSG SIZE  rcvd: 107
        Host 142.123.64.212.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 142.123.64.212.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 117.2.161.244 | attackspam | Unauthorized connection attempt from IP address 117.2.161.244 on Port 445(SMB)  | 
                    2020-03-09 03:09:22 | 
| 114.249.216.199 | attackspambots | Brute force blocker - service: proftpd1 - aantal: 29 - Fri Apr 20 09:30:15 2018  | 
                    2020-03-09 02:47:57 | 
| 222.82.195.157 | attack | Brute force blocker - service: proftpd1 - aantal: 88 - Tue Apr 17 11:00:19 2018  | 
                    2020-03-09 03:12:01 | 
| 180.108.79.87 | attackbots | Brute force blocker - service: proftpd1 - aantal: 27 - Thu Apr 19 16:35:17 2018  | 
                    2020-03-09 02:52:50 | 
| 180.113.29.30 | attackspambots | Brute force blocker - service: proftpd1, proftpd2 - aantal: 138 - Wed Apr 18 06:45:16 2018  | 
                    2020-03-09 03:13:35 | 
| 14.155.115.185 | attackspam | Brute force blocker - service: proftpd1, proftpd2 - aantal: 129 - Fri Apr 20 10:25:16 2018  | 
                    2020-03-09 02:46:11 | 
| 212.224.126.116 | attack | Jan 28 16:46:54 ms-srv sshd[31201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.224.126.116 Jan 28 16:46:56 ms-srv sshd[31201]: Failed password for invalid user usuario from 212.224.126.116 port 53420 ssh2  | 
                    2020-03-09 03:20:47 | 
| 27.203.218.195 | attack | Brute force blocker - service: proftpd1 - aantal: 101 - Thu Apr 19 10:55:15 2018  | 
                    2020-03-09 02:53:50 | 
| 212.34.246.73 | attackbotsspam | Dec 9 14:28:10 ms-srv sshd[27273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.34.246.73 Dec 9 14:28:11 ms-srv sshd[27273]: Failed password for invalid user test from 212.34.246.73 port 37384 ssh2  | 
                    2020-03-09 02:52:07 | 
| 117.25.38.81 | attackbots | Brute force blocker - service: proftpd1 - aantal: 25 - Thu Apr 19 05:25:14 2018  | 
                    2020-03-09 03:01:07 | 
| 51.211.181.179 | attackspam | Unauthorized connection attempt from IP address 51.211.181.179 on Port 445(SMB)  | 
                    2020-03-09 02:51:17 | 
| 58.152.204.70 | attackbotsspam | Honeypot attack, port: 5555, PTR: n058152204070.netvigator.com.  | 
                    2020-03-09 03:20:16 | 
| 212.252.182.220 | attackbotsspam | Feb 4 10:57:48 ms-srv sshd[42658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.252.182.220 user=root Feb 4 10:57:49 ms-srv sshd[42658]: Failed password for invalid user root from 212.252.182.220 port 61858 ssh2  | 
                    2020-03-09 02:56:37 | 
| 111.172.233.47 | attack | Brute force blocker - service: proftpd1 - aantal: 51 - Tue Apr 17 05:35:15 2018  | 
                    2020-03-09 03:24:03 | 
| 222.131.16.116 | attackbots | Brute force blocker - service: proftpd1 - aantal: 95 - Thu Apr 19 04:15:16 2018  | 
                    2020-03-09 02:58:56 |