城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.50.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.22.50.249. IN A
;; AUTHORITY SECTION:
. 238 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:37:56 CST 2022
;; MSG SIZE rcvd: 106
Host 249.50.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.50.22.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.238.73.216 | spamattack | phising scam |
2020-06-21 07:03:34 |
| 85.209.0.101 | attack |
|
2020-06-21 06:45:08 |
| 104.140.188.54 | attackbotsspam | ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 06:42:30 |
| 192.3.181.138 | attackspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-06-21 06:56:41 |
| 92.63.197.70 | attack |
|
2020-06-21 06:44:23 |
| 93.115.1.195 | attackbotsspam | Jun 21 00:54:40 vps sshd[32691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.1.195 Jun 21 00:54:42 vps sshd[32691]: Failed password for invalid user yzi from 93.115.1.195 port 47776 ssh2 Jun 21 00:58:20 vps sshd[412]: Failed password for root from 93.115.1.195 port 51664 ssh2 ... |
2020-06-21 07:05:10 |
| 125.64.94.131 | attackspambots |
|
2020-06-21 06:41:40 |
| 186.96.254.239 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 06:57:51 |
| 64.227.23.68 | attackspambots | Multiport scan 62 ports : 529 1495 1543 4474 4723 6373 6967 7373 7888 10188 10562 10718 10929 11595 11597 11965 12067 12792 12877 13570 14630 14859 16400 16840 16905 16951 17053 17646 17977 18130 18186 19340 19423 19451 19686 19992 20273 20618 21030 21225 21427 21623 21835 21989 22749 23855 23965 24136 26654 26656 27165 28046 28919 29327 29511 30343 31176 31708 31906 31997 32244 32640 |
2020-06-21 06:48:50 |
| 185.39.11.48 | attack |
|
2020-06-21 06:39:25 |
| 37.49.224.125 | attack | NL_XEMU-MNT_<177>1592687834 [1:2402001:5581] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]: |
2020-06-21 06:54:11 |
| 88.214.26.53 | attackspambots |
|
2020-06-21 07:05:51 |
| 45.143.220.110 | attackbots | Multiport scan 18 ports : 53 3070 5067 5068 5069 5075 5076 5089 5860 5960 6666 8082 8083 8100 15060 15070 15080 15090 |
2020-06-21 06:52:37 |
| 185.175.93.17 | attackbotsspam | SmallBizIT.US 8 packets to tcp(8320,8340,8353,8361,8409,8433,8488,8502) |
2020-06-21 07:16:20 |
| 185.156.73.57 | attackspambots | =Multiport scan 299 ports : 80(x7) 123(x13) 443(x11) 1000(x13) 1010(x12) 1111(x12) 1234(x12) 2000(x11) 2020(x11) 2222(x14) 2289(x11) 3000(x11) 3030(x13) 3111 3222 3333(x11) 3350(x14) 3351(x13) 3352(x12) 3353(x12) 3354(x11) 3355(x12) 3356(x11) 3357(x14) 3358(x12) 3359(x12) 3360(x11) 3361(x11) 3362(x12) 3363(x13) 3364(x12) 3365(x14) 3366(x11) 3367(x14) 3368(x11) 3369(x15) 3370(x13) 3371(x11) 3372(x13) 3373(x13) 3374(x13) 3375(x11) 3376(x10) 3377(x12) 3378(x15) 3379(x12) 3380(x12) 3381(x13) 3382(x12) 3383(x12) 3384(x14) 3385(x14) 3386(x12) 3387(x13) 3388(x13) 3390(x12) 3391(x13) 3392(x11) 3393(x12) 3394(x12) 3395(x12) 3396(x12) 3397(x11) 3398(x13) 3399(x13) 3444 3555(x2) 3666 3777 3888 3999(x2) 4000(x14) 4040(x12) 4111 4222(x3) 4333 4444(x11) 4489(x12) 4666(x2) 4777 4888(x2) 4999(x2) 5000(x12) 5050(x14) 5555(x11) 5589(x12) 6000(x11) 6060(x13) 6666(x12) 6689(x11) 7000(x10) 7070(x11) 7777(x13) 7789(x12) 8000(x11) 8080(x12) 8888(x12) 8889(x12) 9000(x13) 9001 9002 9003 9004 9005 9006 9007 9008.... |
2020-06-21 06:59:29 |