城市(city): Xuzhou
省份(region): Jiangsu
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): No.31,Jin-rong Street
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.234.216.187 | attackspambots | Feb 25 00:20:11 grey postfix/smtpd\[28391\]: NOQUEUE: reject: RCPT from unknown\[114.234.216.187\]: 554 5.7.1 Service unavailable\; Client host \[114.234.216.187\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[114.234.216.187\]\; from=\ |
2020-02-25 13:23:53 |
| 114.234.216.221 | attackspam | 2019-11-05 16:37:18 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=[114.234.216.221]:2216 I=[192.147.25.65]:25 input="QUIT " 2019-11-05 16:37:30 H=(hxybgu.edu) [114.234.216.221]:2476 I=[192.147.25.65]:25 sender verify fail for |
2019-11-06 07:45:50 |
| 114.234.214.236 | attackspam | Unauthorised access (Oct 6) SRC=114.234.214.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=39613 TCP DPT=8080 WINDOW=55914 SYN |
2019-10-07 03:36:53 |
| 114.234.216.135 | attackspam | [Aegis] @ 2019-07-20 12:37:09 0100 -> Sendmail rejected message. |
2019-07-21 00:21:12 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.234.21.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38338
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.234.21.239. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 10 00:14:20 +08 2019
;; MSG SIZE rcvd: 118
239.21.234.114.in-addr.arpa domain name pointer 239.21.234.114.broad.xz.js.dynamic.163data.com.cn.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
239.21.234.114.in-addr.arpa name = 239.21.234.114.broad.xz.js.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 73.195.12.73 | attackbots | Unauthorized connection attempt detected from IP address 73.195.12.73 to port 23 [J] |
2020-01-22 23:08:58 |
| 118.24.177.72 | attackspam | Unauthorized connection attempt detected from IP address 118.24.177.72 to port 2220 [J] |
2020-01-22 23:04:32 |
| 45.79.49.77 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.79.49.77 to port 3306 [J] |
2020-01-22 22:41:13 |
| 79.107.225.27 | attack | Unauthorized connection attempt detected from IP address 79.107.225.27 to port 80 [J] |
2020-01-22 23:08:30 |
| 5.77.246.76 | attack | Unauthorized connection attempt detected from IP address 5.77.246.76 to port 1433 [J] |
2020-01-22 22:45:08 |
| 202.91.71.59 | attackbots | Unauthorized connection attempt detected from IP address 202.91.71.59 to port 4567 [J] |
2020-01-22 22:49:02 |
| 170.106.37.136 | attack | Unauthorized connection attempt detected from IP address 170.106.37.136 to port 21 [J] |
2020-01-22 22:57:25 |
| 121.123.37.72 | attackspam | Unauthorized connection attempt detected from IP address 121.123.37.72 to port 4567 [J] |
2020-01-22 23:03:43 |
| 178.210.159.99 | attack | Unauthorized connection attempt detected from IP address 178.210.159.99 to port 80 [J] |
2020-01-22 22:55:43 |
| 101.207.113.73 | attackspam | Unauthorized connection attempt detected from IP address 101.207.113.73 to port 2220 [J] |
2020-01-22 23:07:21 |
| 201.150.102.180 | attackbots | Unauthorized connection attempt detected from IP address 201.150.102.180 to port 4567 [J] |
2020-01-22 22:49:45 |
| 180.180.31.241 | attack | Unauthorized connection attempt detected from IP address 180.180.31.241 to port 8081 [J] |
2020-01-22 22:54:39 |
| 112.118.45.56 | attackbots | Unauthorized connection attempt detected from IP address 112.118.45.56 to port 5555 [J] |
2020-01-22 23:06:03 |
| 162.14.22.99 | attackspambots | Unauthorized connection attempt detected from IP address 162.14.22.99 to port 2220 [J] |
2020-01-22 22:57:44 |
| 46.147.193.169 | attackbotsspam | Unauthorized connection attempt detected from IP address 46.147.193.169 to port 2220 [J] |
2020-01-22 22:40:54 |