城市(city): unknown
省份(region): unknown
国家(country): Kenya
运营商(isp): Airtel
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.231.212.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.231.212.133. IN A
;; AUTHORITY SECTION:
. 445 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020071101 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 12 06:59:44 CST 2020
;; MSG SIZE rcvd: 119
133.212.231.105.in-addr.arpa domain name pointer 133-212-231-105.r.airtelkenya.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
133.212.231.105.in-addr.arpa name = 133-212-231-105.r.airtelkenya.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
198.144.159.129 | attack | DDoS |
2023-08-28 12:56:44 |
5.34.180.208 | attack | Tries to get unauthorized network access |
2023-08-30 03:39:35 |
92.63.196.51 | attack | Scan port |
2023-08-11 13:08:41 |
181.65.149.69 | attack | Scan port |
2023-08-30 12:53:39 |
89.248.163.203 | attack | Scan port |
2023-08-15 12:49:00 |
84.54.51.108 | spam | Scan port |
2023-08-11 13:06:01 |
89.248.163.57 | attack | Scan port |
2023-08-23 12:38:04 |
62.113.202.78 | attack | detected WAN Ping attack from 62.113.202.78 and dropped 126 packets. |
2023-09-04 17:01:17 |
34.117.59.81 | attack | Scan port |
2023-09-05 19:30:07 |
128.199.77.96 | attack | Scan port |
2023-08-16 12:41:14 |
198.144.159.22 | attack | Scan |
2023-08-28 12:58:32 |
192.210.206.189 | attack | Scan port |
2023-08-23 12:33:59 |
91.226.34.251 | attack | hack account roblox |
2023-08-17 18:46:48 |
198.144.159.22 | botsattack | DDoS |
2023-08-29 12:44:54 |
103.120.39.37 | attack | Attack DDOS |
2023-08-30 21:25:27 |