城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.240.4.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39333
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.240.4.42. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019090301 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 04 11:17:00 CST 2019
;; MSG SIZE rcvd: 116
Host 42.4.240.132.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 42.4.240.132.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
192.241.238.229 | attackspambots | firewall-block, port(s): 953/tcp |
2020-03-21 20:27:09 |
192.241.238.217 | attackbots | 102/tcp 5601/tcp 5984/tcp... [2020-03-13/21]9pkt,9pt.(tcp) |
2020-03-21 20:27:58 |
92.63.111.90 | attack | Port 3356 scan denied |
2020-03-21 20:54:09 |
185.34.216.211 | attackspam | Mar 21 11:20:00 [host] sshd[21647]: Invalid user p Mar 21 11:20:00 [host] sshd[21647]: pam_unix(sshd: Mar 21 11:20:02 [host] sshd[21647]: Failed passwor |
2020-03-21 19:57:13 |
185.56.80.50 | attackbots | Unauthorized connection attempt detected from IP address 185.56.80.50 to port 8089 |
2020-03-21 20:35:10 |
185.246.128.133 | attackbots | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(03211123) |
2020-03-21 20:30:40 |
162.243.129.206 | attack | Port 80 (HTTP) access denied |
2020-03-21 20:45:26 |
162.243.133.123 | attackbots | scans once in preceeding hours on the ports (in chronological order) 5800 resulting in total of 46 scans from 162.243.0.0/16 block. |
2020-03-21 20:39:34 |
80.82.65.234 | attack | scans 3 times in preceeding hours on the ports (in chronological order) 9527 8081 60001 resulting in total of 67 scans from 80.82.64.0/20 block. |
2020-03-21 20:59:58 |
106.12.116.209 | attackbotsspam | 5x Failed Password |
2020-03-21 19:59:03 |
103.253.42.35 | attackspambots | 03/21/2020-02:57:49.502110 103.253.42.35 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-21 20:53:30 |
207.154.254.15 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-03-21 20:20:17 |
95.0.194.245 | attackbotsspam | DoS Attack - TCP SYN FloodingIN=erouter0 |
2020-03-21 20:11:04 |
79.124.62.86 | attackspambots | 03/21/2020-06:09:03.518572 79.124.62.86 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-21 20:14:43 |
79.124.62.82 | attackspam | firewall-block, port(s): 13065/tcp, 32091/tcp |
2020-03-21 20:15:15 |