城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.239.7.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.239.7.105.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400
;; Query time: 167 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 03:21:48 CST 2025
;; MSG SIZE  rcvd: 106
        Host 105.7.239.214.in-addr.arpa not found: 2(SERVFAIL)
        server can't find 214.239.7.105.in-addr.arpa: SERVFAIL
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 41.217.216.39 | attackbotsspam | Unauthorized connection attempt detected from IP address 41.217.216.39 to port 2220 [J]  | 
                    2020-01-31 09:28:35 | 
| 37.105.77.197 | attackspambots | Jan 30 22:30:03 mxgate1 postfix/postscreen[10499]: CONNECT from [37.105.77.197]:48278 to [176.31.12.44]:25 Jan 30 22:30:03 mxgate1 postfix/dnsblog[10889]: addr 37.105.77.197 listed by domain zen.spamhaus.org as 127.0.0.3 Jan 30 22:30:03 mxgate1 postfix/dnsblog[10889]: addr 37.105.77.197 listed by domain zen.spamhaus.org as 127.0.0.11 Jan 30 22:30:03 mxgate1 postfix/dnsblog[10889]: addr 37.105.77.197 listed by domain zen.spamhaus.org as 127.0.0.4 Jan 30 22:30:03 mxgate1 postfix/dnsblog[10538]: addr 37.105.77.197 listed by domain cbl.abuseat.org as 127.0.0.2 Jan 30 22:30:03 mxgate1 postfix/dnsblog[10559]: addr 37.105.77.197 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jan 30 22:30:03 mxgate1 postfix/dnsblog[11356]: addr 37.105.77.197 listed by domain bl.spamcop.net as 127.0.0.2 Jan 30 22:30:03 mxgate1 postfix/dnsblog[10540]: addr 37.105.77.197 listed by domain b.barracudacentral.org as 127.0.0.2 Jan 30 22:30:09 mxgate1 postfix/postscreen[10499]: DNSBL rank 6 for [37......... -------------------------------  | 
                    2020-01-31 09:18:29 | 
| 203.160.189.46 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-01-31 09:49:09 | 
| 64.225.2.94 | attackspambots | Unauthorized connection attempt detected, IP banned.  | 
                    2020-01-31 09:43:16 | 
| 106.54.196.9 | attack | Jan 31 01:47:17 meumeu sshd[12297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.9 Jan 31 01:47:19 meumeu sshd[12297]: Failed password for invalid user mardav from 106.54.196.9 port 38832 ssh2 Jan 31 01:50:01 meumeu sshd[12770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.9 ...  | 
                    2020-01-31 09:35:32 | 
| 179.56.157.53 | attack | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-01-31 09:29:58 | 
| 95.209.146.129 | attackbots | Jan 31 02:35:09 gw1 sshd[5380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.209.146.129 Jan 31 02:35:11 gw1 sshd[5380]: Failed password for invalid user artham from 95.209.146.129 port 45302 ssh2 ...  | 
                    2020-01-31 09:40:56 | 
| 186.90.132.254 | attackbots | Honeypot attack, port: 445, PTR: 186-90-132-254.genericrev.cantv.net.  | 
                    2020-01-31 09:17:39 | 
| 180.76.105.165 | attackspam | Unauthorized connection attempt detected from IP address 180.76.105.165 to port 2220 [J]  | 
                    2020-01-31 09:27:14 | 
| 45.11.98.81 | attackspambots | [ 🧯 ] From mailreturn@cotacaorapida.live Thu Jan 30 18:34:58 2020 Received: from optin-mx5.cotacaorapida.live ([45.11.98.81]:48285)  | 
                    2020-01-31 09:53:27 | 
| 208.90.186.196 | attack | tcp 23  | 
                    2020-01-31 09:27:50 | 
| 5.14.13.52 | attackspambots | Unauthorized connection attempt detected from IP address 5.14.13.52 to port 80 [J]  | 
                    2020-01-31 09:45:57 | 
| 2.37.198.220 | attack | Jan 31 02:00:09 MK-Soft-Root1 sshd[4112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.37.198.220 Jan 31 02:00:11 MK-Soft-Root1 sshd[4112]: Failed password for invalid user sacaru from 2.37.198.220 port 51974 ssh2 ...  | 
                    2020-01-31 09:51:40 | 
| 106.124.137.190 | attackspam | Unauthorized connection attempt detected from IP address 106.124.137.190 to port 2220 [J]  | 
                    2020-01-31 09:31:57 | 
| 77.37.132.131 | attack | Jan 30 23:24:32 lock-38 sshd[22194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.132.131 Jan 30 23:24:33 lock-38 sshd[22194]: Failed password for invalid user twinkle from 77.37.132.131 port 51510 ssh2 ...  | 
                    2020-01-31 09:44:52 |