城市(city): Norman
省份(region): Oklahoma
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.251.212.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.251.212.226.		IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 02:28:51 CST 2025
;; MSG SIZE  rcvd: 108
        226.212.251.108.in-addr.arpa domain name pointer 108-251-212-226.lightspeed.okcbok.sbcglobal.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
226.212.251.108.in-addr.arpa	name = 108-251-212-226.lightspeed.okcbok.sbcglobal.net.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 113.88.112.243 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-23 18:40:34 | 
| 185.202.1.237 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack  | 
                    2020-04-23 19:04:57 | 
| 62.167.57.3 | attackbots | port 23  | 
                    2020-04-23 18:51:25 | 
| 122.100.197.114 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-23 18:39:56 | 
| 82.102.173.75 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-04-23 18:46:32 | 
| 91.134.185.91 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-23 18:44:00 | 
| 112.213.105.24 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-23 18:40:52 | 
| 59.34.233.229 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 42 - port: 30996 proto: TCP cat: Misc Attack  | 
                    2020-04-23 18:52:25 | 
| 77.243.191.18 | attackbots | TCP port 3389: Scan and connection  | 
                    2020-04-23 18:48:21 | 
| 202.194.224.151 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-23 18:35:36 | 
| 43.245.222.163 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 22 - port: 62078 proto: TCP cat: Misc Attack  | 
                    2020-04-23 18:56:58 | 
| 45.14.150.140 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 18052 proto: TCP cat: Misc Attack  | 
                    2020-04-23 18:56:42 | 
| 36.81.203.211 | attack | Apr 23 11:44:09 ns3164893 sshd[26405]: Failed password for root from 36.81.203.211 port 41624 ssh2 Apr 23 11:49:54 ns3164893 sshd[26536]: Invalid user oracle from 36.81.203.211 port 52140 ...  | 
                    2020-04-23 18:33:23 | 
| 36.68.130.151 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-23 18:58:27 | 
| 77.247.108.119 | attack | Unauthorized connection attempt detected from IP address 77.247.108.119 to port 443  | 
                    2020-04-23 18:48:09 |