城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.38.210.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.38.210.204. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:54:45 CST 2022
;; MSG SIZE rcvd: 107
204.210.38.150.in-addr.arpa domain name pointer intlcent.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer law.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer kouza.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer ningen.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer kgujesus.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer es.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer hs.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer mes.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer mhs.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer shien.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer www.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer univ.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer bungaku.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa domain name pointer keizai.kanto-gakuin.
b'204.210.38.150.in-addr.arpa name = kyoumu.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = bungaku.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = es.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = shushoku.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = kougaku.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = univ.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = hougaku.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = gakusei.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = mes.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = kgujesus.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = law.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = kouza.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = hs.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = www.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = nyushi.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = shien.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = keizai.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = media.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = ningen.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = intlcent.kanto-gakuin.ac.jp.
204.210.38.150.in-addr.arpa name = mhs.kanto-gakuin.ac.jp.
Authoritative answers can be found from:
'
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 31.20.193.52 | attackspam | Aug 9 07:59:16 * sshd[11792]: Failed password for root from 31.20.193.52 port 57274 ssh2 |
2020-08-09 15:57:37 |
| 80.82.78.85 | attackbots |
|
2020-08-09 15:43:54 |
| 93.70.153.195 | attack | Automatic report - Banned IP Access |
2020-08-09 15:50:50 |
| 73.56.95.151 | attack | trying to access non-authorized port |
2020-08-09 15:38:46 |
| 121.124.46.44 | attackbots | Automatic report - Banned IP Access |
2020-08-09 15:43:12 |
| 106.52.196.163 | attackbots | Brute-force attempt banned |
2020-08-09 15:47:58 |
| 171.227.82.151 | attack | Unauthorised access (Aug 9) SRC=171.227.82.151 LEN=52 TTL=110 ID=26933 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-09 15:42:24 |
| 152.136.141.88 | attack | Aug 8 20:41:35 pixelmemory sshd[3056903]: Failed password for root from 152.136.141.88 port 46220 ssh2 Aug 8 20:46:49 pixelmemory sshd[3067757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.141.88 user=root Aug 8 20:46:50 pixelmemory sshd[3067757]: Failed password for root from 152.136.141.88 port 58146 ssh2 Aug 8 20:51:55 pixelmemory sshd[3078669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.141.88 user=root Aug 8 20:51:57 pixelmemory sshd[3078669]: Failed password for root from 152.136.141.88 port 41838 ssh2 ... |
2020-08-09 15:36:13 |
| 68.183.146.249 | attackbotsspam | xmlrpc attack |
2020-08-09 15:35:11 |
| 192.241.232.136 | attack | Aug 9 09:45:26 nopemail postfix/smtps/smtpd[960]: SSL_accept error from unknown[192.241.232.136]: -1 ... |
2020-08-09 15:51:14 |
| 139.199.80.67 | attack | Fail2Ban |
2020-08-09 16:04:24 |
| 192.241.185.120 | attackbots | Aug 9 09:06:22 web-main sshd[806915]: Failed password for root from 192.241.185.120 port 40727 ssh2 Aug 9 09:14:21 web-main sshd[806929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.185.120 user=root Aug 9 09:14:23 web-main sshd[806929]: Failed password for root from 192.241.185.120 port 46369 ssh2 |
2020-08-09 15:28:25 |
| 27.113.49.20 | attack | Aug 9 05:51:37 raspberrypi sshd[7069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.113.49.20 Aug 9 05:51:39 raspberrypi sshd[7069]: Failed password for invalid user ubnt from 27.113.49.20 port 37156 ssh2 ... |
2020-08-09 15:52:12 |
| 90.176.150.123 | attackspam | SSH Brute Force |
2020-08-09 15:55:36 |
| 14.169.103.56 | attack | Automatic report - Port Scan Attack |
2020-08-09 16:03:12 |