城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.20.244.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.20.244.225. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040400 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 04 14:41:00 CST 2022
;; MSG SIZE rcvd: 107
225.244.20.107.in-addr.arpa domain name pointer ec2-107-20-244-225.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
225.244.20.107.in-addr.arpa name = ec2-107-20-244-225.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 417A | proxy | Bahagia |
2021-01-04 03:25:36 |
| 185.63.253.205 | attack | Juraidah |
2021-01-13 12:29:19 |
| 49.37.163.151 | attack | Tried to connect to my network |
2021-01-03 01:25:32 |
| 185.63.253.205 | attack | Juraidah |
2021-01-13 12:29:26 |
| 188.24.217.44 | attacknormal | vxvvvv |
2021-01-13 15:13:55 |
| 116.206.12.48 | spambotsattackproxynormal | Hack facebook |
2021-01-12 13:59:03 |
| 165.22.79.166 | attack | NGINX Error log on xx.xx.xx.xx_portal_nginx_n1, upstream failed 2021/01/08 08:54:31 [error] 5969#0: *25997705 upstream sent no valid HTTP/1.0 header while reading response header from upstream, client: 165.22.79.169, server: xxx.xx, request: "GET /cgi-bin/weblogin.cgi?username=admin';echo $((1+1787568)) HTTP/1.1", upstream: "http://xx.xx.xx.xx:8000/cgi-bin/weblogin.cgi?username=admin';echo $((1+1787568))", host: "xxx.xx" |
2021-01-08 11:06:40 |
| 185.63.253.205 | spambotsattackproxynormal | Yes |
2021-01-09 11:38:32 |
| 127.163.30.151 | normal | I have prize |
2021-01-13 04:41:19 |
| 185.63.253.205 | attack | Juraidah |
2021-01-13 12:29:22 |
| 217.163.30.151 | attack | Comment faire pour trouver cette cadeau |
2021-01-08 00:42:00 |
| 185.63.253.205 | spambotsattackproxynormal | Bokep jepang |
2021-01-06 20:51:39 |
| 51.79.29.55 | spamattack | Website attack, scanning for username and passwd |
2021-01-04 16:30:38 |
| 149.255.212.52 | normal | 24 |
2021-01-02 08:43:44 |
| 185.150.190.18 | spam | 10.01.2021 15:17:16 SMTP Server: ppidcasegroup.com (185.150.190.18) connected 10.01.2021 15:17:18 SMTP Server: Originator: |
2021-01-10 22:32:43 |