城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.21.204.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.21.204.18. IN A
;; AUTHORITY SECTION:
. 170 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010502 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 10:46:10 CST 2022
;; MSG SIZE rcvd: 106
Host 18.204.21.117.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 18.204.21.117.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.243.94.158 | attackspam | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(10151156) |
2019-10-16 01:46:01 |
| 121.181.120.99 | attackspam | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=278)(10151156) |
2019-10-16 01:56:05 |
| 91.103.97.77 | attackbotsspam | 10/15/2019-18:22:07.867714 91.103.97.77 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-10-16 01:46:25 |
| 109.252.2.187 | attackspambots | [portscan] udp/500 [isakmp] [scan/connect: 6 time(s)] in spfbl.net:'listed' *(RWIN=-)(10151156) |
2019-10-16 01:57:24 |
| 104.206.128.50 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-16 01:29:49 |
| 95.52.231.57 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=639)(10151156) |
2019-10-16 01:57:52 |
| 41.39.1.239 | attack | [portscan] tcp/1433 [MsSQL] in spfbl.net:'listed' *(RWIN=1024)(10151156) |
2019-10-16 01:50:41 |
| 46.21.100.222 | attack | Honeypot hit. |
2019-10-16 01:36:41 |
| 222.214.9.56 | attackspambots | [portscan] tcp/1433 [MsSQL] in spfbl.net:'listed' *(RWIN=1024)(10151156) |
2019-10-16 01:38:11 |
| 115.41.28.253 | attackbots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=9218)(10151156) |
2019-10-16 01:44:52 |
| 114.225.219.151 | attack | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=16615)(10151156) |
2019-10-16 01:56:52 |
| 124.65.18.102 | attackbotsspam | UTC: 2019-10-14 pkts: 3 port: 22/tcp |
2019-10-16 01:27:22 |
| 45.56.91.118 | attackbotsspam | UTC: 2019-10-14 port: 80/tcp |
2019-10-16 01:50:15 |
| 51.255.234.209 | attack | Oct 15 20:06:38 pkdns2 sshd\[39306\]: Invalid user p3g@s!51 from 51.255.234.209Oct 15 20:06:39 pkdns2 sshd\[39306\]: Failed password for invalid user p3g@s!51 from 51.255.234.209 port 54960 ssh2Oct 15 20:10:41 pkdns2 sshd\[39505\]: Invalid user safeuser from 51.255.234.209Oct 15 20:10:44 pkdns2 sshd\[39505\]: Failed password for invalid user safeuser from 51.255.234.209 port 37596 ssh2Oct 15 20:14:40 pkdns2 sshd\[39658\]: Invalid user sparky1234 from 51.255.234.209Oct 15 20:14:42 pkdns2 sshd\[39658\]: Failed password for invalid user sparky1234 from 51.255.234.209 port 48460 ssh2 ... |
2019-10-16 01:35:29 |
| 81.215.201.109 | attack | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=20826)(10151156) |
2019-10-16 01:58:52 |