城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.216.139.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.216.139.109.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 21:29:23 CST 2025
;; MSG SIZE  rcvd: 108
        Host 109.139.216.142.in-addr.arpa not found: 2(SERVFAIL)
        ;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53
** server can't find 109.139.216.142.in-addr.arpa: SERVFAIL
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 193.37.255.114 | attackspam | Unauthorized connection attempt detected from IP address 193.37.255.114 to port 5555  | 
                    2020-03-25 20:12:47 | 
| 157.245.81.162 | attackbotsspam | Unauthorized connection attempt detected from IP address 157.245.81.162 to port 8545  | 
                    2020-03-25 20:28:02 | 
| 77.247.108.119 | attack | Mar 25 13:43:21 debian-2gb-nbg1-2 kernel: \[7399281.536872\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.119 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=21052 PROTO=TCP SPT=58435 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-03-25 20:43:45 | 
| 165.227.65.140 | attack | Port 8545 (Ethereum client) access denied  | 
                    2020-03-25 20:26:54 | 
| 88.214.26.53 | attackspambots | firewall-block, port(s): 45689/tcp  | 
                    2020-03-25 19:57:07 | 
| 94.102.56.181 | attackspam | scans 5 times in preceeding hours on the ports (in chronological order) 3741 3757 3765 3769 3749 resulting in total of 16 scans from 94.102.48.0/20 block.  | 
                    2020-03-25 20:32:27 | 
| 92.118.37.70 | attackspam | Port scan: Attack repeated for 24 hours  | 
                    2020-03-25 20:34:59 | 
| 49.51.12.25 | attackspambots | Unauthorized connection attempt detected from IP address 49.51.12.25 to port 5001  | 
                    2020-03-25 20:01:02 | 
| 198.20.99.130 | attackspambots | Unauthorized connection attempt detected from IP address 198.20.99.130 to port 9041  | 
                    2020-03-25 20:11:59 | 
| 89.248.167.131 | attackbots | 03/25/2020-08:23:12.364103 89.248.167.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98  | 
                    2020-03-25 20:37:41 | 
| 94.102.56.215 | attack | Port 41046 scan denied  | 
                    2020-03-25 20:31:57 | 
| 92.118.37.99 | attackspam | scans 13 times in preceeding hours on the ports (in chronological order) 30911 31711 32011 30811 36211 37211 30411 33011 37211 37011 34711 26611 26311 resulting in total of 29 scans from 92.118.37.0/24 block.  | 
                    2020-03-25 20:33:59 | 
| 176.113.70.60 | attackspam | 176.113.70.60 was recorded 5 times by 2 hosts attempting to connect to the following ports: 1900. Incident counter (4h, 24h, all-time): 5, 39, 4531  | 
                    2020-03-25 20:25:37 | 
| 87.214.234.168 | attack | Telnet/23 MH Probe, Scan, BF, Hack -  | 
                    2020-03-25 20:38:32 | 
| 198.108.67.63 | attackbots | Mar 25 09:22:59 debian-2gb-nbg1-2 kernel: \[7383659.994191\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.63 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=4961 PROTO=TCP SPT=53770 DPT=49971 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-03-25 20:08:47 |