城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.67.40.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.67.40.249. IN A
;; AUTHORITY SECTION:
. 163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 11:42:17 CST 2022
;; MSG SIZE rcvd: 106
Host 249.40.67.112.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.40.67.112.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 119.235.102.65 | attack | Unauthorized connection attempt detected from IP address 119.235.102.65 to port 2220 [J] |
2020-01-30 00:47:21 |
| 104.206.128.22 | attackspambots | Unauthorized connection attempt detected from IP address 104.206.128.22 to port 3306 [J] |
2020-01-30 01:02:37 |
| 139.99.91.35 | attack | Unauthorized connection attempt detected from IP address 139.99.91.35 to port 2220 [J] |
2020-01-30 00:33:50 |
| 51.89.99.60 | attackbots | scan z |
2020-01-30 00:42:46 |
| 200.105.219.116 | attackbotsspam | 2019-07-09 15:50:25 1hkqVk-0003zD-DN SMTP connection from static-200-105-219-116.acelerate.net \[200.105.219.116\]:13766 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 15:50:36 1hkqVv-0003zf-EO SMTP connection from static-200-105-219-116.acelerate.net \[200.105.219.116\]:13883 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 15:50:43 1hkqW2-0003zk-BI SMTP connection from static-200-105-219-116.acelerate.net \[200.105.219.116\]:13961 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 01:01:50 |
| 173.249.34.254 | attack | 29.01.2020 13:43:19 Connection to port 69 blocked by firewall |
2020-01-30 00:31:43 |
| 222.186.30.167 | attackbots | Unauthorized connection attempt detected from IP address 222.186.30.167 to port 22 [J] |
2020-01-30 00:38:23 |
| 71.6.147.254 | attackbotsspam | Unauthorized connection attempt detected from IP address 71.6.147.254 to port 5801 [J] |
2020-01-30 00:35:23 |
| 2.90.194.6 | attackspam | 2019-11-25 05:12:47 1iZ5jy-0003iR-0f SMTP connection from \(\[2.90.194.6\]\) \[2.90.194.6\]:57435 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-11-25 05:12:57 1iZ5k8-0003ii-AK SMTP connection from \(\[2.90.194.6\]\) \[2.90.194.6\]:57523 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-11-25 05:13:08 1iZ5kH-0003it-Vv SMTP connection from \(\[2.90.194.6\]\) \[2.90.194.6\]:36194 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 01:13:17 |
| 200.127.241.176 | attack | 2019-06-22 00:29:18 1heS20-0002O4-UJ SMTP connection from 200-127-241-176.cab.prima.net.ar \[200.127.241.176\]:29762 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 00:29:34 1heS2G-0002OM-OQ SMTP connection from 200-127-241-176.cab.prima.net.ar \[200.127.241.176\]:29883 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 00:29:45 1heS2R-0002OU-A9 SMTP connection from 200-127-241-176.cab.prima.net.ar \[200.127.241.176\]:29976 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 00:31:20 |
| 200.106.100.105 | attackspam | 2019-01-29 15:43:54 1goUcD-00050t-FQ SMTP connection from \(client-200.106.100.105.speedy.net.pe\) \[200.106.100.105\]:29731 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-01-29 15:44:04 1goUcO-00051G-7N SMTP connection from \(client-200.106.100.105.speedy.net.pe\) \[200.106.100.105\]:29849 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-01-29 15:44:09 1goUcS-00051V-Uc SMTP connection from \(client-200.106.100.105.speedy.net.pe\) \[200.106.100.105\]:29909 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 01:00:38 |
| 68.183.176.131 | attackspambots | Unauthorized connection attempt detected from IP address 68.183.176.131 to port 2220 [J] |
2020-01-30 00:32:19 |
| 2.91.136.115 | attackbots | 2019-10-23 14:57:32 1iNGCh-0003rT-Cw SMTP connection from \(\[2.91.136.115\]\) \[2.91.136.115\]:25366 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 14:58:10 1iNGDJ-0003sD-Gf SMTP connection from \(\[2.91.136.115\]\) \[2.91.136.115\]:25713 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 14:58:30 1iNGDe-0003sk-6r SMTP connection from \(\[2.91.136.115\]\) \[2.91.136.115\]:25915 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 01:10:49 |
| 93.174.93.27 | attackbots | Jan 29 17:26:45 h2177944 kernel: \[3513406.259414\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=93.174.93.27 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=14783 PROTO=TCP SPT=52046 DPT=156 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 29 17:26:45 h2177944 kernel: \[3513406.259429\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=93.174.93.27 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=14783 PROTO=TCP SPT=52046 DPT=156 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 29 17:31:40 h2177944 kernel: \[3513701.281422\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=93.174.93.27 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=24636 PROTO=TCP SPT=52046 DPT=923 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 29 17:31:40 h2177944 kernel: \[3513701.281437\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=93.174.93.27 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=24636 PROTO=TCP SPT=52046 DPT=923 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 29 17:40:41 h2177944 kernel: \[3514241.736663\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=93.174.93.27 DST=85.214.117.9 LEN=40 T |
2020-01-30 00:51:10 |
| 14.215.129.156 | attack | 445/tcp 1433/tcp... [2019-12-05/2020-01-29]8pkt,2pt.(tcp) |
2020-01-30 01:07:50 |