城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.239.146.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.239.146.49. IN A
;; AUTHORITY SECTION:
. 60 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022101 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:54:04 CST 2022
;; MSG SIZE rcvd: 107
49.146.239.104.in-addr.arpa domain name pointer www.mlgw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.146.239.104.in-addr.arpa name = www.mlgw.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
198.199.113.105 | attack | Scam ports possibly some US government agency, cia, or fbi |
2023-09-18 06:46:39 |
8.217.143.156 | attack | Scan port |
2023-10-05 12:48:31 |
212.64.216.252 | attack | NTP DDoS |
2023-09-19 12:35:52 |
109.122.24.247 | spambotsattackproxynormal | Привет |
2023-09-21 16:18:09 |
213.166.69.74 | attack | Possible Phishing |
2023-10-05 21:54:34 |
89.248.165.84 | attack | Scan port |
2023-09-29 13:10:21 |
89.248.165.249 | attack | Scan port |
2023-10-14 19:22:40 |
23.35.210.165 | attack | Scan port |
2023-10-11 13:38:49 |
95.141.43.196 | attackproxy | Scan port |
2023-10-13 12:36:54 |
172.173.67.237 | attack | WP attacker, using XML RPC. |
2023-09-19 16:32:44 |
122.51.231.49 | spambotsattackproxynormal | আর কত দিন এভাবে আমার আনিচ কাকা |
2023-10-10 20:21:43 |
89.248.163.246 | attack | Scan port |
2023-10-06 14:46:01 |
193.203.8.241 | attack | Tried to force into my Bitwarden account. |
2023-10-07 20:31:03 |
113.190.2.39 | spambotsattackproxynormal | log |
2023-09-22 01:24:12 |
144.91.111.145 | attack | Scan port |
2023-10-02 20:53:02 |