城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): Verizon
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.214.8.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;97.214.8.119. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:40:35 CST 2025
;; MSG SIZE rcvd: 105
119.8.214.97.in-addr.arpa domain name pointer 119.sub-97-214-8.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
119.8.214.97.in-addr.arpa name = 119.sub-97-214-8.myvzw.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 140.207.155.102 | attackbots | Port Scan: UDP/49153 |
2019-09-14 14:41:12 |
| 68.101.38.102 | attackbotsspam | Port Scan: UDP/137 |
2019-09-14 14:21:05 |
| 102.158.181.64 | attackbots | Port Scan: TCP/60001 |
2019-09-14 14:45:47 |
| 181.40.66.61 | attackbotsspam | Port Scan: TCP/445 |
2019-09-14 14:38:44 |
| 42.233.94.221 | attackbotsspam | Port Scan: TCP/23 |
2019-09-14 14:55:13 |
| 107.144.147.50 | attackspam | Port Scan: UDP/137 |
2019-09-14 14:44:46 |
| 74.50.193.7 | attackbots | Port Scan: TCP/5431 |
2019-09-14 14:50:44 |
| 182.119.155.200 | attackbots | k+ssh-bruteforce |
2019-09-14 15:05:01 |
| 116.228.147.46 | attackspambots | Port Scan: UDP/37853 |
2019-09-14 14:43:29 |
| 186.64.121.145 | attackbots | Sep 13 20:48:40 hpm sshd\[22331\]: Invalid user qhsupport from 186.64.121.145 Sep 13 20:48:40 hpm sshd\[22331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.64.121.145 Sep 13 20:48:43 hpm sshd\[22331\]: Failed password for invalid user qhsupport from 186.64.121.145 port 49000 ssh2 Sep 13 20:53:44 hpm sshd\[22757\]: Invalid user wifin from 186.64.121.145 Sep 13 20:53:44 hpm sshd\[22757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.64.121.145 |
2019-09-14 15:08:24 |
| 5.77.144.84 | attack | Port Scan: TCP/445 |
2019-09-14 14:28:57 |
| 45.233.139.16 | attackbots | Port Scan: TCP/445 |
2019-09-14 14:24:29 |
| 68.81.114.106 | attackspambots | Port Scan: UDP/23 |
2019-09-14 14:21:24 |
| 92.53.65.52 | attackbots | 09/14/2019-01:16:46.103486 92.53.65.52 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-14 14:47:59 |
| 186.150.201.240 | attackbotsspam | Port Scan: UDP/137 |
2019-09-14 14:36:07 |