城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.250.73.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23050
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.250.73.52. IN A
;; AUTHORITY SECTION:
. 315 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010301 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 12:43:11 CST 2022
;; MSG SIZE rcvd: 106
52.73.250.142.in-addr.arpa domain name pointer iad23s85-in-f20.1e100.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
52.73.250.142.in-addr.arpa name = iad23s85-in-f20.1e100.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.248.187.165 | attackspam | Invalid user mc from 104.248.187.165 port 41054 |
2019-06-21 20:46:14 |
| 186.215.130.159 | attack | Brute force attempt |
2019-06-21 21:00:41 |
| 220.83.161.249 | attackbotsspam | 21.06.2019 10:17:48 SSH access blocked by firewall |
2019-06-21 21:28:08 |
| 45.55.12.248 | attackbotsspam | Invalid user shit from 45.55.12.248 port 33538 |
2019-06-21 20:56:28 |
| 36.72.218.97 | attackspambots | 8080/tcp [2019-06-21]1pkt |
2019-06-21 21:27:44 |
| 106.56.115.39 | attackspam | 5500/tcp [2019-06-21]1pkt |
2019-06-21 21:29:24 |
| 116.211.118.246 | attackspambots | 3389BruteforceFW22 |
2019-06-21 20:51:37 |
| 185.200.118.35 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-06-21 20:54:29 |
| 103.120.224.10 | attackspambots | 20 attempts against mh-ssh on wave.magehost.pro |
2019-06-21 20:47:42 |
| 198.143.158.82 | attackspam | Portscanning on different or same port(s). |
2019-06-21 20:52:17 |
| 142.44.202.51 | attackspam | 142.44.202.51 - - [21/Jun/2019:11:14:16 +0200] "GET /wp-includes/css/modules.php HTTP/1.1" 404 16363 "-" "python-requests/2.18.4" 142.44.202.51 - - [21/Jun/2019:11:14:20 +0200] "GET /wso.php HTTP/1.1" 404 16525 "-" "python-requests/2.18.4" 142.44.202.51 - - [21/Jun/2019:11:14:24 +0200] "GET /wp-content/plugins/upspy/ HTTP/1.1" 404 11538 "-" "python-requests/2.18.4" 142.44.202.51 - - [21/Jun/2019:11:14:28 +0200] "GET /wp-content/plugins/ubh/ HTTP/1.1" 404 11682 "-" "python-requests/2.18.4" 142.44.202.51 - - [21/Jun/2019:11:14:34 +0200] "GET /wp-content/plugins/vwcleanerplugin/bump.php?cache HTTP/1.1" 404 16592 "-" "python-requests/2.18.4" ... |
2019-06-21 21:14:06 |
| 5.39.92.185 | attackspambots | SSH Bruteforce |
2019-06-21 21:02:25 |
| 1.75.49.171 | attackbotsspam | Autoban 1.75.49.171 VIRUS |
2019-06-21 21:37:27 |
| 95.73.48.204 | attackbots | Fail2Ban Ban Triggered |
2019-06-21 21:38:11 |
| 86.175.191.112 | attackspambots | 37215/tcp [2019-06-21]1pkt |
2019-06-21 21:35:09 |