城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.42.102.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.42.102.4. IN A
;; AUTHORITY SECTION:
. 547 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061503 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 06:23:39 CST 2022
;; MSG SIZE rcvd: 104
4.102.42.41.in-addr.arpa domain name pointer host-41.42.102.4.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.102.42.41.in-addr.arpa name = host-41.42.102.4.tedata.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
222.221.248.242 | attackspam | $f2bV_matches |
2020-03-29 07:35:47 |
212.81.57.19 | attackbotsspam | Mar 28 23:39:16 mail.srvfarm.net postfix/smtpd[518400]: NOQUEUE: reject: RCPT from unknown[212.81.57.19]: 554 5.7.1 Service unavailable; Client host [212.81.57.19] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL440932 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-03-29 07:45:41 |
198.98.60.141 | attackbotsspam | SSH Login Bruteforce |
2020-03-29 07:14:28 |
201.49.127.212 | attackspambots | Invalid user pk from 201.49.127.212 port 56940 |
2020-03-29 07:48:38 |
14.161.49.16 | attack | 445/tcp [2020-03-28]1pkt |
2020-03-29 07:47:22 |
218.63.76.41 | attackspambots | DATE:2020-03-28 22:31:20, IP:218.63.76.41, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq) |
2020-03-29 07:47:37 |
193.70.37.148 | attack | Invalid user admin from 193.70.37.148 port 60312 |
2020-03-29 07:38:41 |
5.238.116.197 | attackspam | 37215/tcp 37215/tcp [2020-03-26]2pkt |
2020-03-29 07:43:07 |
35.245.33.180 | attack | Mar 28 23:43:41 nextcloud sshd\[21744\]: Invalid user guest from 35.245.33.180 Mar 28 23:43:41 nextcloud sshd\[21744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.245.33.180 Mar 28 23:43:43 nextcloud sshd\[21744\]: Failed password for invalid user guest from 35.245.33.180 port 33894 ssh2 |
2020-03-29 07:24:20 |
190.110.224.124 | attackbots | 23/tcp [2020-03-28]1pkt |
2020-03-29 07:51:38 |
72.164.246.194 | attack | 445/tcp 445/tcp 445/tcp... [2020-02-01/03-28]10pkt,1pt.(tcp) |
2020-03-29 07:17:03 |
151.13.131.10 | attackspam | port 23 |
2020-03-29 07:49:01 |
1.193.39.196 | attack | Invalid user y from 1.193.39.196 port 32786 |
2020-03-29 07:21:06 |
103.107.17.139 | attack | Invalid user hung from 103.107.17.139 port 48792 |
2020-03-29 07:17:56 |
128.199.133.201 | attackbots | Mar 28 12:10:31: Invalid user mul from 128.199.133.201 port 49573 |
2020-03-29 07:33:59 |