城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.50.139.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59684
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.50.139.128. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:35:11 CST 2022
;; MSG SIZE rcvd: 107
128.139.50.119.in-addr.arpa domain name pointer 128.139.50.119.adsl-pool.jlccptt.net.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
128.139.50.119.in-addr.arpa name = 128.139.50.119.adsl-pool.jlccptt.net.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.91.212.80 | attack | Apr 23 14:15:39 debian-2gb-nbg1-2 kernel: \[9903088.632988\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.91.212.80 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=57697 DPT=8006 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-04-23 20:20:38 |
| 177.16.204.208 | attackbotsspam | SSH Brute-Force Attack |
2020-04-23 20:48:35 |
| 45.227.255.204 | attackspambots | 2020-04-22 UTC: (53x) - root(53x) |
2020-04-23 20:44:47 |
| 92.52.35.12 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 22125 proto: TCP cat: Misc Attack |
2020-04-23 20:35:58 |
| 61.7.172.196 | attack | port 23 |
2020-04-23 20:49:25 |
| 83.97.20.35 | attackspambots | [Thu Apr 23 05:13:10 2020] - DDoS Attack From IP: 83.97.20.35 Port: 54393 |
2020-04-23 20:39:30 |
| 64.227.17.251 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 52 - port: 5847 proto: TCP cat: Misc Attack |
2020-04-23 20:18:26 |
| 23.94.175.46 | attack | (From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to mathesfamilychiropractic.com? The price is just $67 per link, via Paypal. To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/6jp87 If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner. Kind Regards, Claudia |
2020-04-23 20:51:02 |
| 77.247.110.25 | attackspambots | 6069/udp 5064/udp 6079/udp... [2020-03-14/04-23]105pkt,7pt.(udp) |
2020-04-23 20:15:14 |
| 54.37.210.33 | attackbotsspam | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-04-23 20:19:00 |
| 49.206.26.9 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 29 - port: 1433 proto: TCP cat: Misc Attack |
2020-04-23 20:22:13 |
| 222.119.65.176 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-23 20:52:02 |
| 146.88.240.4 | attackspambots | 04/23/2020-08:18:55.914916 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-04-23 20:31:16 |
| 13.75.46.224 | attack | Invalid user dd from 13.75.46.224 port 52688 |
2020-04-23 20:26:53 |
| 87.251.74.240 | attackspam | 04/23/2020-06:41:04.133464 87.251.74.240 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-23 20:37:39 |