城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.29.188.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.29.188.222. IN A
;; AUTHORITY SECTION:
. 546 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:01:27 CST 2022
;; MSG SIZE rcvd: 107
Host 222.188.29.121.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 222.188.29.121.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.119.160.145 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 1009 proto: TCP cat: Misc Attack |
2020-05-03 06:44:42 |
| 104.206.128.42 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 99 - port: 3389 proto: TCP cat: Misc Attack |
2020-05-03 06:40:08 |
| 45.113.70.37 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 22 - port: 8291 proto: TCP cat: Misc Attack |
2020-05-03 07:01:26 |
| 104.140.242.35 | attack | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-05-03 06:40:56 |
| 89.248.168.176 | attackspambots | 8480/tcp 8442/tcp 8383/tcp... [2020-03-02/05-02]225pkt,76pt.(tcp) |
2020-05-03 06:48:25 |
| 92.118.161.1 | attackbots | 6379/tcp 6002/tcp 2222/tcp... [2020-03-02/05-02]75pkt,50pt.(tcp),5pt.(udp) |
2020-05-03 06:45:21 |
| 104.140.188.30 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 06:41:35 |
| 94.102.50.137 | attackbotsspam | firewall-block, port(s): 1002/tcp, 1003/tcp |
2020-05-03 07:14:09 |
| 89.248.160.150 | attack | 89.248.160.150 was recorded 8 times by 5 hosts attempting to connect to the following ports: 3330,3331. Incident counter (4h, 24h, all-time): 8, 54, 12943 |
2020-05-03 07:17:21 |
| 23.100.95.234 | attackspambots | 5060/udp [2020-05-02]1pkt |
2020-05-03 07:03:30 |
| 92.118.37.55 | attackspambots | 05/02/2020-18:28:02.108661 92.118.37.55 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-03 06:46:59 |
| 87.251.74.201 | attack | Multiport scan : 33 ports scanned 50 101 111 404 808 900 3381 3392 3397 4433 4444 5005 6666 8899 10001 11111 15000 20002 21000 23000 23389 26000 27000 30000 30003 33333 33382 33390 33391 33890 33893 43389 55555 |
2020-05-03 06:51:28 |
| 84.38.184.53 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 71 - port: 2440 proto: TCP cat: Misc Attack |
2020-05-03 06:52:14 |
| 13.35.253.67 | attackspambots | ET INFO TLS Handshake Failure - port: 4708 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 07:04:15 |
| 104.206.128.70 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 100 - port: 161 proto: UDP cat: Misc Attack |
2020-05-03 06:39:51 |