城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.0.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.0.203. IN A
;; AUTHORITY SECTION:
. 298 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:28:30 CST 2022
;; MSG SIZE rcvd: 105
Host 203.0.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 203.0.21.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.230.136.161 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:09:20 |
| 185.175.93.3 | attackspam | Multiport scan : 4 ports scanned 3400 3402 3409 3411 |
2019-11-11 01:57:15 |
| 172.69.134.142 | attack | ET INFO User-Agent (python-requests) Inbound to Webserver - port: 80 proto: TCP cat: Attempted Information Leak |
2019-11-11 02:17:20 |
| 185.176.27.46 | attackbotsspam | 11/10/2019-17:34:02.956038 185.176.27.46 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-11 01:45:36 |
| 185.209.0.18 | attack | Multiport scan : 32 ports scanned 4300 4301 4312 4313 4315 4317 4330 4336 4337 4339 4340 4342 4344 4345 4348 4349 4351 4352 4354 4359 4370 4372 4374 4377 4380 4383 4386 4390 4393 4396 4398 4399 |
2019-11-11 02:14:43 |
| 185.143.221.62 | attack | ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 443 proto: TCP cat: Attempted Information Leak |
2019-11-11 02:16:41 |
| 159.203.201.137 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 37416 proto: TCP cat: Misc Attack |
2019-11-11 02:18:16 |
| 185.142.236.34 | attackbots | Port scan: Attack repeated for 24 hours |
2019-11-11 01:46:28 |
| 49.51.241.239 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 8005 proto: TCP cat: Misc Attack |
2019-11-11 01:53:11 |
| 211.144.1.166 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:11:33 |
| 159.203.201.245 | attack | ET DROP Dshield Block Listed Source group 1 - port: 19425 proto: TCP cat: Misc Attack |
2019-11-11 01:57:37 |
| 221.204.177.48 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 01:53:58 |
| 37.49.230.8 | attackbotsspam | 37.49.230.8 was recorded 28 times by 28 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 28, 87, 330 |
2019-11-11 02:08:21 |
| 114.246.204.22 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:20:22 |
| 81.22.45.116 | attackbotsspam | Nov 10 18:22:46 mc1 kernel: \[4692851.602618\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=32537 PROTO=TCP SPT=49986 DPT=54618 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 10 18:27:16 mc1 kernel: \[4693121.414225\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=44375 PROTO=TCP SPT=49986 DPT=55069 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 10 18:31:40 mc1 kernel: \[4693385.432503\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=19571 PROTO=TCP SPT=49986 DPT=54609 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-11 01:41:12 |