城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.79.70.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.79.70.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:38:35 CST 2025
;; MSG SIZE rcvd: 105
31.70.79.121.in-addr.arpa domain name pointer ip-31.70.79.121.VOCUS.net.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.70.79.121.in-addr.arpa name = ip-31.70.79.121.VOCUS.net.au.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.169.173.147 | attackspambots | Port 1433 Scan |
2020-01-17 01:33:32 |
| 177.244.56.230 | attack | Unauthorized connection attempt from IP address 177.244.56.230 on Port 445(SMB) |
2020-01-17 01:35:38 |
| 85.192.154.47 | attackbots | Unauthorized connection attempt from IP address 85.192.154.47 on Port 445(SMB) |
2020-01-17 01:32:13 |
| 159.203.201.63 | attack | Portscan or hack attempt detected by psad/fwsnort |
2020-01-17 01:28:30 |
| 194.8.56.201 | attackbotsspam | Unauthorized connection attempt detected from IP address 194.8.56.201 to port 83 [J] |
2020-01-17 01:51:16 |
| 103.99.1.245 | attackspam | firewall-block, port(s): 5900/tcp |
2020-01-17 01:37:00 |
| 181.30.27.11 | attackbotsspam | Unauthorized connection attempt detected from IP address 181.30.27.11 to port 2220 [J] |
2020-01-17 02:04:21 |
| 66.220.155.138 | attackbots | Jan 16 14:00:03 grey postfix/smtpd\[27378\]: NOQUEUE: reject: RCPT from 66-220-155-138.mail-mail.facebook.com\[66.220.155.138\]: 554 5.7.1 Service unavailable\; Client host \[66.220.155.138\] blocked using ix.dnsbl.manitu.net\; Your e-mail service was detected by mail.ixlab.de \(NiX Spam\) as spamming at Thu, 16 Jan 2020 03:18:09 +0100. Your admin should visit http://www.dnsbl.manitu.net/lookup.php\?value=66.220.155.138\; from=\ |
2020-01-17 01:59:28 |
| 52.37.134.147 | attackspam | SSH_scan |
2020-01-17 01:55:33 |
| 93.174.93.33 | attackbotsspam | 01/16/2020-12:29:42.690970 93.174.93.33 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-17 01:46:09 |
| 185.175.56.17 | attackspambots | Spammer |
2020-01-17 01:52:03 |
| 82.221.105.6 | attackbots | Unauthorized connection attempt detected from IP address 82.221.105.6 to port 2323 |
2020-01-17 01:24:47 |
| 168.245.123.156 | attackspambots | Absolute nuisance spam about trading... very pushy with several messages sent per day... totally unsolicited... such presentations are not to be trusted when portrayed in this manner. This suspect content is being sent from domain of @m.dripemail2.com designates 168.245.123.156 as permitted sender. |
2020-01-17 01:34:04 |
| 223.241.78.187 | attackbots | SMTP nagging |
2020-01-17 01:49:38 |
| 187.86.204.111 | attackbotsspam | Wordpress login scanning |
2020-01-17 01:33:17 |