城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.134.146.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;84.134.146.141. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:47:16 CST 2025
;; MSG SIZE rcvd: 107
141.146.134.84.in-addr.arpa domain name pointer p5486928d.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
141.146.134.84.in-addr.arpa name = p5486928d.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.129.33.12 | attack |
|
2020-10-14 05:48:33 |
| 51.79.54.234 | attack | SSH Brute Force |
2020-10-14 06:03:05 |
| 49.88.112.75 | attackspam | Oct 14 01:04:49 pkdns2 sshd\[1452\]: Failed password for root from 49.88.112.75 port 64825 ssh2Oct 14 01:07:42 pkdns2 sshd\[1671\]: Failed password for root from 49.88.112.75 port 26086 ssh2Oct 14 01:08:39 pkdns2 sshd\[1713\]: Failed password for root from 49.88.112.75 port 64328 ssh2Oct 14 01:08:41 pkdns2 sshd\[1713\]: Failed password for root from 49.88.112.75 port 64328 ssh2Oct 14 01:08:44 pkdns2 sshd\[1713\]: Failed password for root from 49.88.112.75 port 64328 ssh2Oct 14 01:09:37 pkdns2 sshd\[1774\]: Failed password for root from 49.88.112.75 port 58137 ssh2 ... |
2020-10-14 06:23:48 |
| 115.159.201.15 | attack | SSH Brute Force |
2020-10-14 05:57:23 |
| 158.69.110.31 | attackbotsspam | SSH Brute Force |
2020-10-14 05:54:46 |
| 59.47.67.146 | attackspam | Brute-force attempt banned |
2020-10-14 06:22:55 |
| 153.200.103.72 | attack | SSH Brute Force |
2020-10-14 06:20:59 |
| 45.129.33.56 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 13478 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:47:02 |
| 45.148.121.85 | attackbotsspam |
|
2020-10-14 05:44:48 |
| 1.196.238.130 | attack | SSH Brute Force |
2020-10-14 06:24:38 |
| 45.129.33.145 | attack | ET DROP Dshield Block Listed Source group 1 - port: 39557 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:45:18 |
| 167.99.75.240 | attackbotsspam | SSH Invalid Login |
2020-10-14 05:53:47 |
| 62.114.151.182 | attack | firewall-block, port(s): 445/tcp |
2020-10-14 06:14:28 |
| 128.199.124.63 | attack | fail2ban -- 128.199.124.63 ... |
2020-10-14 06:07:50 |
| 181.129.175.58 | attack | SSH Brute Force |
2020-10-14 06:06:18 |