城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.68.50.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.68.50.37. IN A
;; AUTHORITY SECTION:
. 415 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050403 1800 900 604800 86400
;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 09:03:26 CST 2020
;; MSG SIZE rcvd: 116
Host 37.50.68.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 37.50.68.114.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.117.20.126 | attackbotsspam | Unauthorized connection attempt detected from IP address 42.117.20.126 to port 23 |
2019-12-31 20:46:49 |
| 61.144.244.75 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 57 - port: 8088 proto: TCP cat: Misc Attack |
2019-12-31 21:20:02 |
| 42.117.213.80 | attackspambots | Unauthorized connection attempt detected from IP address 42.117.213.80 to port 23 |
2019-12-31 21:22:21 |
| 164.52.24.176 | attackbots | Unauthorized connection attempt detected from IP address 164.52.24.176 to port 992 |
2019-12-31 21:01:47 |
| 176.226.143.177 | attackbots | Unauthorized connection attempt detected from IP address 176.226.143.177 to port 445 |
2019-12-31 20:59:47 |
| 218.247.35.77 | attack | Unauthorized connection attempt detected from IP address 218.247.35.77 to port 1433 |
2019-12-31 20:54:34 |
| 42.117.104.150 | attack | Unauthorized connection attempt detected from IP address 42.117.104.150 to port 23 |
2019-12-31 20:46:30 |
| 61.130.20.2 | attack | Unauthorized connection attempt detected from IP address 61.130.20.2 to port 1433 |
2019-12-31 20:41:17 |
| 42.118.85.92 | attackbotsspam | Caught in portsentry honeypot |
2019-12-31 20:45:32 |
| 122.226.40.94 | attackspambots | Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445 |
2019-12-31 21:05:30 |
| 222.203.17.150 | attack | Unauthorized connection attempt detected from IP address 222.203.17.150 to port 1433 |
2019-12-31 20:52:55 |
| 222.244.182.124 | attack | Unauthorized connection attempt detected from IP address 222.244.182.124 to port 23 |
2019-12-31 20:52:27 |
| 220.180.104.130 | attack | [portscan] tcp/21 [FTP] [scan/connect: 6 time(s)] in DroneBL:'listed [IRC Drone]' in sorbs:'listed [spam]' *(RWIN=65535)(12311301) |
2019-12-31 20:54:21 |
| 61.157.91.111 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 57 - port: 1433 proto: TCP cat: Misc Attack |
2019-12-31 21:19:34 |
| 118.70.74.164 | attackspam | 1577776517 - 12/31/2019 08:15:17 Host: 118.70.74.164/118.70.74.164 Port: 445 TCP Blocked |
2019-12-31 21:09:03 |