城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.96.118.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.96.118.252. IN A
;; AUTHORITY SECTION:
. 345 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:37:19 CST 2023
;; MSG SIZE rcvd: 107
252.118.96.104.in-addr.arpa domain name pointer a104-96-118-252.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
252.118.96.104.in-addr.arpa name = a104-96-118-252.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 87.251.74.248 | attack | Multiport scan : 31 ports scanned 4007 4017 4027 4038 4107 4130 4173 4221 4239 4277 4393 4425 4431 4450 4651 4670 4690 4699 4715 4717 4718 4746 4789 4795 4821 4824 4856 4860 4877 4884 4999 |
2020-05-03 06:50:51 |
| 185.175.93.14 | attack | 05/02/2020-18:30:47.080582 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-03 07:07:28 |
| 92.53.65.52 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 84 - port: 2996 proto: TCP cat: Misc Attack |
2020-05-03 06:47:35 |
| 98.126.7.234 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 1433 proto: TCP cat: Misc Attack |
2020-05-03 06:43:11 |
| 87.251.74.242 | attackspambots | Multiport scan : 41 ports scanned 3029 3068 3078 3082 3101 3107 3120 3160 3163 3182 3223 3242 3244 3282 3339 3345 3366 3376 3385 3395 3472 3491 3492 3533 3541 3546 3565 3566 3575 3595 3614 3626 3664 3666 3693 3787 3788 3872 3913 3952 3977 |
2020-05-03 06:51:07 |
| 103.221.252.34 | attackspam | firewall-block, port(s): 10652/tcp |
2020-05-03 06:42:31 |
| 51.89.67.61 | attackspam | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-05-03 06:58:54 |
| 94.102.49.190 | attack | [Sat Apr 18 11:53:56 2020] - DDoS Attack From IP: 94.102.49.190 Port: 24858 |
2020-05-03 07:14:31 |
| 92.118.37.70 | attack | Multiport scan : 11 ports scanned 3390 3391 3392 3394 3397 3399 3400 3403 3406 3407 3410 |
2020-05-03 06:46:40 |
| 68.183.85.116 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 9237 proto: TCP cat: Misc Attack |
2020-05-03 06:55:10 |
| 13.35.253.18 | attackspam | ET INFO TLS Handshake Failure - port: 15969 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 07:04:41 |
| 68.183.55.223 | attackspam | firewall-block, port(s): 9064/tcp |
2020-05-03 06:55:24 |
| 80.211.251.5 | attackspambots | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-05-03 06:53:06 |
| 64.225.114.44 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 51 - port: 1137 proto: TCP cat: Misc Attack |
2020-05-03 06:56:52 |
| 94.102.56.181 | attackspambots | May 3 00:38:44 debian-2gb-nbg1-2 kernel: \[10718030.454716\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=64936 PROTO=TCP SPT=40429 DPT=5094 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-03 07:13:25 |