城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.249.25.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.249.25.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:38:08 CST 2025
;; MSG SIZE rcvd: 107
Host 169.25.249.130.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 169.25.249.130.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 83.97.20.37 | attackspambots | probes 7 times on the port 1080 3128 4567 5432 8080 8081 8089 resulting in total of 38 scans from 83.97.20.0/24 block. |
2020-03-27 18:30:07 |
| 185.176.27.102 | attack | 03/27/2020-06:41:01.660187 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-27 18:46:19 |
| 185.175.93.104 | attackspam | scans 16 times in preceeding hours on the ports (in chronological order) 6006 52525 6001 6663 53389 50500 55555 5389 40404 5566 5020 42000 5001 5400 5100 5900 resulting in total of 131 scans from 185.175.93.0/24 block. |
2020-03-27 18:50:08 |
| 80.82.64.146 | attack | Mar 27 10:15:50 debian-2gb-nbg1-2 kernel: \[7559622.104197\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.64.146 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10187 PROTO=TCP SPT=40336 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-27 18:31:56 |
| 185.175.93.105 | attack | Mar 27 11:30:28 debian-2gb-nbg1-2 kernel: \[7564099.524534\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.105 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10825 PROTO=TCP SPT=49815 DPT=311 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-27 18:49:44 |
| 223.71.167.165 | attackspam | Unauthorized connection attempt detected from IP address 223.71.167.165 to port 9653 [T] |
2020-03-27 18:39:31 |
| 185.176.27.42 | attack | 03/27/2020-06:26:08.433323 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-27 18:46:59 |
| 93.174.93.72 | attack | scans 19 times in preceeding hours on the ports (in chronological order) 58998 36998 35998 46998 50998 41998 55998 47998 34543 34528 34539 34529 34538 34541 34544 34541 34530 34529 34543 resulting in total of 21 scans from 93.174.88.0/21 block. |
2020-03-27 19:01:11 |
| 80.82.65.234 | attackbotsspam | probes 5 times on the port 5555 60001 8080 9001 resulting in total of 133 scans from 80.82.64.0/20 block. |
2020-03-27 18:31:33 |
| 185.176.27.34 | attack | 03/27/2020-06:35:18.068059 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-27 18:47:34 |
| 162.243.130.216 | attack | 8022/tcp 18369/tcp 44818/tcp... [2020-03-14/26]12pkt,10pt.(tcp),1pt.(udp) |
2020-03-27 18:21:24 |
| 179.96.62.29 | attack | 20/3/27@00:20:29: FAIL: Alarm-Network address from=179.96.62.29 ... |
2020-03-27 18:17:30 |
| 198.108.66.234 | attackspambots | 12203/tcp 12510/tcp 9052/tcp... [2020-02-08/03-27]112pkt,107pt.(tcp),1tp.(icmp) |
2020-03-27 18:41:35 |
| 80.82.77.189 | attackbotsspam | 03/27/2020-06:30:05.492776 80.82.77.189 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-27 18:31:07 |
| 185.175.93.78 | attackspam | Port-scan: detected 101 distinct ports within a 24-hour window. |
2020-03-27 18:50:35 |