城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.91.68.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.91.68.96. IN A
;; AUTHORITY SECTION:
. 493 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 11:26:09 CST 2022
;; MSG SIZE rcvd: 104
96.68.91.34.in-addr.arpa domain name pointer 96.68.91.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
96.68.91.34.in-addr.arpa name = 96.68.91.34.bc.googleusercontent.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
188.165.23.42 | attack | Invalid user windywinter from 188.165.23.42 port 40328 |
2019-10-06 06:15:58 |
159.203.201.124 | attack | 1 pkts, ports: TCP:26 |
2019-10-06 06:54:56 |
125.227.140.91 | attackspam | 1 pkts, ports: TCP:445 |
2019-10-06 06:30:40 |
165.22.193.150 | attackspam | 1 pkts, ports: TCP:5432 |
2019-10-06 06:53:39 |
200.82.102.176 | attackbotsspam | 1 pkts, ports: TCP:8888 |
2019-10-06 06:22:25 |
159.203.201.228 | attackbotsspam | 1 pkts, ports: TCP:8022 |
2019-10-06 06:54:23 |
68.2.167.155 | attack | 1 pkts, ports: UDP:1 |
2019-10-06 06:37:57 |
220.132.1.217 | attackspam | 1 pkts, ports: TCP:445 |
2019-10-06 06:40:50 |
185.5.172.148 | attackbots | 1 pkts, ports: UDP:1 |
2019-10-06 06:26:12 |
74.82.47.14 | attack | 1 pkts, ports: UDP:53 |
2019-10-06 06:37:01 |
189.226.40.55 | attackspam | 1 pkts, ports: TCP:8000 |
2019-10-06 06:25:17 |
192.99.30.200 | attackspambots | 1 pkts, ports: UDP:5060 |
2019-10-06 06:24:28 |
125.163.95.96 | attackbots | 1 pkts, ports: TCP:445 |
2019-10-06 06:30:59 |
198.108.67.32 | attackspam | 1 pkts, ports: TCP:180 |
2019-10-06 06:43:34 |
140.249.22.238 | attackspambots | Oct 5 16:49:44 dallas01 sshd[19870]: Failed password for root from 140.249.22.238 port 39734 ssh2 Oct 5 16:53:30 dallas01 sshd[20482]: Failed password for root from 140.249.22.238 port 44832 ssh2 |
2019-10-06 06:29:53 |