城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.42.192.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.42.192.91.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:42:47 CST 2025
;; MSG SIZE  rcvd: 10591.192.42.64.in-addr.arpa domain name pointer static.grouptelecom.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
91.192.42.64.in-addr.arpa	name = static.grouptelecom.net.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 222.186.175.212 | attack | $f2bV_matches | 2020-09-20 00:52:26 | 
| 81.215.102.154 | attackspam | Unauthorized connection attempt from IP address 81.215.102.154 on Port 445(SMB) | 2020-09-20 00:22:44 | 
| 159.65.9.229 | attack | [f2b] sshd bruteforce, retries: 1 | 2020-09-20 00:29:30 | 
| 218.92.0.223 | attack | SSH Brute-Force attacks | 2020-09-20 00:38:59 | 
| 157.119.250.57 | attackbotsspam | Found on CINS badguys / proto=6 . srcport=52548 . dstport=5980 . (1428) | 2020-09-20 00:42:33 | 
| 192.241.217.113 | attackspambots | (sshd) Failed SSH login from 192.241.217.113 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 19 11:13:08 jbs1 sshd[2705]: Invalid user admin from 192.241.217.113 Sep 19 11:13:08 jbs1 sshd[2705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.217.113 Sep 19 11:13:11 jbs1 sshd[2705]: Failed password for invalid user admin from 192.241.217.113 port 51082 ssh2 Sep 19 11:21:47 jbs1 sshd[8646]: Invalid user testu from 192.241.217.113 Sep 19 11:21:47 jbs1 sshd[8646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.217.113 | 2020-09-20 00:55:47 | 
| 82.165.159.131 | attack | 82.165.159.131 | 2020-09-20 00:27:35 | 
| 12.165.80.213 | attackspam | RDP Bruteforce | 2020-09-20 00:51:57 | 
| 178.239.148.136 | attackspambots | Automatic report - Port Scan Attack | 2020-09-20 00:54:37 | 
| 112.120.140.81 | attackbots | Sep 19 13:08:11 vps639187 sshd\[19456\]: Invalid user admin from 112.120.140.81 port 58605 Sep 19 13:08:11 vps639187 sshd\[19456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.120.140.81 Sep 19 13:08:13 vps639187 sshd\[19456\]: Failed password for invalid user admin from 112.120.140.81 port 58605 ssh2 ... | 2020-09-20 00:22:00 | 
| 140.238.42.16 | attackspam | scan | 2020-09-20 00:52:45 | 
| 157.230.249.90 | attack | 9578/tcp 25188/tcp 8143/tcp... [2020-08-31/09-19]39pkt,13pt.(tcp) | 2020-09-20 00:40:39 | 
| 180.76.135.15 | attack | $f2bV_matches | 2020-09-20 00:43:05 | 
| 113.254.181.160 | attackspambots | Port Scan detected! ... | 2020-09-20 00:27:12 | 
| 159.203.85.196 | attack | Invalid user user from 159.203.85.196 port 37784 | 2020-09-20 00:39:21 |