城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.219.55.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.219.55.4. IN A
;; AUTHORITY SECTION:
. 565 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:22:06 CST 2022
;; MSG SIZE rcvd: 105
Host 4.55.219.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 4.55.219.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.147.76.9 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-14/07-10]16pkt,1pt.(tcp) |
2019-07-10 22:38:24 |
| 85.108.28.108 | attack | TCP port 445 (SMB) attempt blocked by firewall. [2019-07-10 10:46:34] |
2019-07-10 23:03:48 |
| 176.252.238.195 | attackbots | Jul 10 14:59:34 work-partkepr sshd\[19296\]: Invalid user user from 176.252.238.195 port 57169 Jul 10 14:59:34 work-partkepr sshd\[19296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.252.238.195 ... |
2019-07-10 23:28:03 |
| 103.56.139.41 | attackspambots | 445/tcp 445/tcp 445/tcp [2019-07-02/10]3pkt |
2019-07-10 22:34:19 |
| 89.233.219.153 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-10 22:41:26 |
| 74.50.211.86 | attack | (From lupe.hart@outlook.com) Good day I just checked out your website sigafoosejackson.com and wanted to find out if you need help for SEO Link Building ? If you aren't using SEO Software then you will know the amount of work load involved in creating accounts, confirming emails and submitting your contents to thousands of websites. With THIS SOFTWARE the link submission process will be the easiest task and completely automated, you will be able to build unlimited number of links and increase traffic to your websites which will lead to a higher number of customers and much more sales for you. IF YOU ARE INTERESTED, We offer you 7 days free trial CONTACT US HERE ==> dindinaa421@gmail.com Regards, Best Seo Software |
2019-07-10 22:35:17 |
| 172.245.211.247 | attackspam | (From eric@talkwithcustomer.com) Hello purdychiropractic.com, People ask, “why does TalkWithCustomer work so well?” It’s simple. TalkWithCustomer enables you to connect with a prospective customer at EXACTLY the Perfect Time. - NOT one week, two weeks, three weeks after they’ve checked out your website purdychiropractic.com. - NOT with a form letter style email that looks like it was written by a bot. - NOT with a robocall that could come at any time out of the blue. TalkWithCustomer connects you to that person within seconds of THEM asking to hear from YOU. They kick off the conversation. They take that first step. They ask to hear from you regarding what you have to offer and how it can make their life better. And it happens almost immediately. In real time. While they’re still looking over your website purdychiropractic.com, trying to make up their mind whether you are right for them. When you connect with them at that very moment it’s the ultimate in Perfect Timing – as on |
2019-07-10 22:44:05 |
| 139.199.158.14 | attackspam | Jul 10 14:34:20 *** sshd[5835]: Invalid user administrator from 139.199.158.14 |
2019-07-10 23:08:50 |
| 46.151.255.34 | attackspambots | Jul 10 16:34:56 m2 sshd[11010]: Failed password for r.r from 46.151.255.34 port 44040 ssh2 Jul 10 16:34:59 m2 sshd[11010]: Failed password for r.r from 46.151.255.34 port 44040 ssh2 Jul 10 16:35:01 m2 sshd[11010]: Failed password for r.r from 46.151.255.34 port 44040 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=46.151.255.34 |
2019-07-10 23:41:42 |
| 46.149.204.158 | attackspam | 7070/tcp 8090/tcp 8090/tcp [2019-06-19/07-10]3pkt |
2019-07-10 22:56:33 |
| 222.89.231.12 | attackspambots | Attempts against Pop3/IMAP |
2019-07-10 23:16:40 |
| 177.72.28.62 | attackspam | SMTP-sasl brute force ... |
2019-07-10 23:11:17 |
| 184.105.247.254 | attackbotsspam | 389/tcp 7547/tcp 873/tcp... [2019-05-11/07-10]39pkt,17pt.(tcp),2pt.(udp) |
2019-07-10 23:49:29 |
| 60.170.189.178 | attackbots | 23/tcp 37215/tcp 23/tcp [2019-06-03/07-10]3pkt |
2019-07-10 23:08:13 |
| 3.80.126.242 | attackbotsspam | Jul 10 08:48:29 TCP Attack: SRC=3.80.126.242 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=235 DF PROTO=TCP SPT=47142 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0 |
2019-07-10 22:53:05 |