城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.200.218.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.200.218.219. IN A
;; AUTHORITY SECTION:
. 465 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400
;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 15:20:38 CST 2019
;; MSG SIZE rcvd: 119
219.218.200.107.in-addr.arpa domain name pointer 107-200-218-219.lightspeed.irvnca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
219.218.200.107.in-addr.arpa name = 107-200-218-219.lightspeed.irvnca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.189.39.38 | attack | Unauthorized connection attempt detected from IP address 187.189.39.38 to port 23 [J] |
2020-03-02 23:57:55 |
| 84.200.110.124 | spam | MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord, en TOTALE INFRACTION avec les Législations Européennes comme Française sur la RGPD, donc à condamner à 750 € par pourriel émis, et tout ça pour du CUL, du SEXE... info@gurdet.co.cr => 190.0.224.183 qui renvoie sur : http://www.superpuperr.blogspot.com/9itfhgbkjn9ijnrfhgbkjngvgv http://www.superpuperr.blogspot.com/56rjkn09igvhjbkjnjnkjn9irsvhjbhjbkjngv https://en.asytech.cn/check-ip/190.0.224.183 190.0.224.183 => cyberfuel.com gurdet.co.cr => 190.0.230.72 https://www.mywot.com/scorecard/gurdet.co.cr https://en.asytech.cn/check-ip/190.0.230.72 gurdet.co.cr resend to zonaempresarial.org zonaempresarial.org => 1&1 IONOS SE - 1&1 Internet Inc zonaempresarial.org => 23.236.62.147 https://www.mywot.com/scorecard/zonaempresarial.org https://en.asytech.cn/check-ip/23.236.62.147 In fact the union of the big German and American shits, what else ? https://www.mywot.com/scorecard/1api.net https://www.mywot.com/scorecard/cyberfuel.com |
2020-03-03 00:08:39 |
| 179.4.0.160 | attack | Unauthorized connection attempt detected from IP address 179.4.0.160 to port 80 [J] |
2020-03-03 00:01:48 |
| 1.52.244.63 | attack | Unauthorized connection attempt detected from IP address 1.52.244.63 to port 23 [J] |
2020-03-03 00:23:15 |
| 173.12.132.177 | attackspambots | Unauthorized connection attempt detected from IP address 173.12.132.177 to port 8080 [J] |
2020-03-03 00:05:38 |
| 117.251.21.23 | attack | Unauthorized connection attempt detected from IP address 117.251.21.23 to port 1433 [J] |
2020-03-03 00:11:07 |
| 189.198.165.63 | attack | Unauthorized connection attempt detected from IP address 189.198.165.63 to port 81 [J] |
2020-03-02 23:55:35 |
| 188.148.161.41 | attackbots | Unauthorized connection attempt detected from IP address 188.148.161.41 to port 5555 [J] |
2020-03-03 00:29:15 |
| 14.102.68.174 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.102.68.174 to port 23 [J] |
2020-03-03 00:22:20 |
| 218.244.151.120 | attackspam | Unauthorized connection attempt detected from IP address 218.244.151.120 to port 1433 [J] |
2020-03-03 00:25:38 |
| 122.228.19.80 | attack | Unauthorized connection attempt detected from IP address 122.228.19.80 to port 8041 [J] |
2020-03-03 00:38:16 |
| 186.34.237.124 | attackbotsspam | Unauthorized connection attempt detected from IP address 186.34.237.124 to port 80 [J] |
2020-03-02 23:59:07 |
| 185.95.186.153 | attack | Unauthorized connection attempt detected from IP address 185.95.186.153 to port 80 [J] |
2020-03-03 00:30:50 |
| 94.208.239.91 | attack | Unauthorized connection attempt detected from IP address 94.208.239.91 to port 8080 [J] |
2020-03-03 00:13:58 |
| 139.162.108.129 | attack | Unauthorized connection attempt detected from IP address 139.162.108.129 to port 3389 [J] |
2020-03-03 00:35:42 |