城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.168.107.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.168.107.40. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022090101 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 02 03:02:12 CST 2022
;; MSG SIZE rcvd: 107
40.107.168.104.in-addr.arpa domain name pointer 104-168-107-40-host.colocrossing.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.107.168.104.in-addr.arpa name = 104-168-107-40-host.colocrossing.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 129.205.115.14 | attack | Unauthorized connection attempt detected from IP address 129.205.115.14 to port 445 |
2020-05-13 01:28:33 |
| 51.52.147.58 | attackspambots | Unauthorized connection attempt detected from IP address 51.52.147.58 to port 5555 |
2020-05-13 01:45:37 |
| 197.45.34.90 | attack | Unauthorized connection attempt detected from IP address 197.45.34.90 to port 445 |
2020-05-13 01:54:42 |
| 85.39.203.128 | attackspambots | Unauthorized connection attempt detected from IP address 85.39.203.128 to port 23 |
2020-05-13 01:37:50 |
| 88.241.5.58 | attackbotsspam | Unauthorized connection attempt detected from IP address 88.241.5.58 to port 23 |
2020-05-13 01:36:27 |
| 79.167.39.5 | attack | Unauthorized connection attempt detected from IP address 79.167.39.5 to port 23 |
2020-05-13 01:40:07 |
| 87.107.143.217 | attack | Unauthorized connection attempt detected from IP address 87.107.143.217 to port 8080 |
2020-05-13 01:37:17 |
| 112.85.42.188 | attack | 05/12/2020-13:27:50.820916 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-05-13 01:29:10 |
| 222.186.42.136 | attackbotsspam | 05/12/2020-13:47:19.904417 222.186.42.136 Protocol: 6 ET SCAN Potential SSH Scan |
2020-05-13 01:50:34 |
| 211.250.233.33 | attackspam | Unauthorized connection attempt detected from IP address 211.250.233.33 to port 23 |
2020-05-13 01:52:10 |
| 5.200.86.91 | attackspam | Unauthorized connection attempt detected from IP address 5.200.86.91 to port 23 |
2020-05-13 01:49:38 |
| 179.159.32.229 | attackbots | Unauthorized connection attempt detected from IP address 179.159.32.229 to port 8080 |
2020-05-13 02:03:42 |
| 109.165.175.22 | attackspambots | 20/5/12@12:30:33: FAIL: Alarm-Network address from=109.165.175.22 20/5/12@12:30:33: FAIL: Alarm-Network address from=109.165.175.22 ... |
2020-05-13 01:31:21 |
| 58.76.162.249 | attackspam | 58.76.162.249 - - [12/May/2020:18:59:17 +0200] "GET / HTTP/1.1" 400 0 "-" "-" |
2020-05-13 01:45:16 |
| 2.37.234.50 | attackspambots | Unauthorized connection attempt detected from IP address 2.37.234.50 to port 83 |
2020-05-13 01:50:00 |