城市(city): unknown
省份(region): unknown
国家(country): Egypt
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): TE-AS
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.44.138.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31418
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.44.138.158. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071601 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 17 01:52:23 CST 2019
;; MSG SIZE rcvd: 118
158.138.44.102.in-addr.arpa domain name pointer host-102.44.138.158.tedata.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
158.138.44.102.in-addr.arpa name = host-102.44.138.158.tedata.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 38.17.54.132 | attack | Trolling for resource vulnerabilities |
2020-09-26 19:05:20 |
| 15.228.21.240 | attack | Web Spam |
2020-09-26 18:58:16 |
| 41.146.133.73 | attackbots | Automatic report - Port Scan Attack |
2020-09-26 18:29:19 |
| 182.120.48.198 | attack | Listed on abuseat.org plus zen-spamhaus / proto=6 . srcport=48883 . dstport=23 . (3511) |
2020-09-26 18:57:27 |
| 106.12.94.65 | attackbotsspam | Invalid user yun from 106.12.94.65 port 54072 |
2020-09-26 18:49:32 |
| 122.51.60.39 | attackbotsspam | " " |
2020-09-26 18:59:06 |
| 162.142.125.22 | attackbotsspam |
|
2020-09-26 18:54:36 |
| 116.236.60.114 | attackspam | Invalid user tecnico from 116.236.60.114 port 35752 |
2020-09-26 18:25:42 |
| 121.123.58.195 | attackbots | Automatic report - Port Scan Attack |
2020-09-26 18:33:44 |
| 171.244.27.68 | attack | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-09-26 18:30:39 |
| 144.217.72.135 | attack | Unauthorized connection attempt
IP: 144.217.72.135
Ports affected
Simple Mail Transfer (25)
Message Submission (587)
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
AS16276 OVH SAS
Canada (CA)
CIDR 144.217.0.0/16
Log Date: 26/09/2020 9:28:22 AM UTC |
2020-09-26 19:05:46 |
| 103.207.11.10 | attackspam | TCP port : 24842 |
2020-09-26 18:33:59 |
| 138.68.176.38 | attackspambots | Invalid user s from 138.68.176.38 port 43318 |
2020-09-26 18:42:33 |
| 192.241.214.158 | attackbotsspam | 17185/udp 2375/tcp 8200/tcp... [2020-09-17/26]7pkt,6pt.(tcp),1pt.(udp) |
2020-09-26 18:39:00 |
| 201.204.169.163 | attack | 20/9/25@16:34:30: FAIL: Alarm-Network address from=201.204.169.163 20/9/25@16:34:30: FAIL: Alarm-Network address from=201.204.169.163 ... |
2020-09-26 18:38:47 |