城市(city): unknown
省份(region): unknown
国家(country): Norway
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.218.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.118.218.227. IN A
;; AUTHORITY SECTION:
. 440 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022051700 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 18 01:45:56 CST 2022
;; MSG SIZE rcvd: 108
227.218.118.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-118-218-x.hidden-host.tietoevry.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
227.218.118.139.in-addr.arpa name = tietoevry-owned-address-139-118-218-x.hidden-host.tietoevry.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.66.99.1 | attackspambots | Unauthorized connection attempt detected from IP address 112.66.99.1 to port 2095 |
2019-12-31 08:33:07 |
| 124.225.43.144 | attackbots | Unauthorized connection attempt detected from IP address 124.225.43.144 to port 2086 |
2019-12-31 08:48:32 |
| 117.50.60.193 | attackspambots | Unauthorized connection attempt detected from IP address 117.50.60.193 to port 21 |
2019-12-31 08:28:14 |
| 42.114.228.30 | attackspam | Unauthorized connection attempt detected from IP address 42.114.228.30 to port 23 |
2019-12-31 08:38:52 |
| 139.180.218.107 | attackspambots | Unauthorized connection attempt detected from IP address 139.180.218.107 to port 139 |
2019-12-31 08:25:25 |
| 113.58.239.203 | attackspambots | Unauthorized connection attempt detected from IP address 113.58.239.203 to port 8080 |
2019-12-31 08:32:07 |
| 58.252.108.38 | attackbotsspam | Unauthorized connection attempt detected from IP address 58.252.108.38 to port 1433 |
2019-12-31 08:13:40 |
| 124.225.47.126 | attackspambots | Unauthorized connection attempt detected from IP address 124.225.47.126 to port 2086 |
2019-12-31 08:48:12 |
| 183.129.160.229 | attackbotsspam | firewall-block, port(s): 14054/tcp, 50197/tcp |
2019-12-31 08:22:16 |
| 182.254.129.29 | attackbotsspam | Unauthorized connection attempt from IP address 182.254.129.29 on Port 445(SMB) |
2019-12-31 08:45:13 |
| 120.27.27.69 | attackspambots | Unauthorized connection attempt detected from IP address 120.27.27.69 to port 23 |
2019-12-31 08:26:54 |
| 125.119.13.25 | attackbots | Unauthorized connection attempt detected from IP address 125.119.13.25 to port 2095 |
2019-12-31 08:25:51 |
| 106.45.1.129 | attackspambots | Unauthorized connection attempt detected from IP address 106.45.1.129 to port 2095 |
2019-12-31 08:36:00 |
| 113.128.104.169 | attackspam | Unauthorized connection attempt detected from IP address 113.128.104.169 to port 2095 |
2019-12-31 08:31:20 |
| 218.92.0.158 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158 user=root Failed password for root from 218.92.0.158 port 36652 ssh2 Failed password for root from 218.92.0.158 port 36652 ssh2 Failed password for root from 218.92.0.158 port 36652 ssh2 Failed password for root from 218.92.0.158 port 36652 ssh2 |
2019-12-31 08:20:07 |