城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.248.48.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.248.48.142. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:13:16 CST 2022
;; MSG SIZE rcvd: 107
142.48.248.162.in-addr.arpa domain name pointer host.nma-fallout.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.48.248.162.in-addr.arpa name = host.nma-fallout.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.10.1.228 | attack | [portscan] tcp/1433 [MsSQL] in spfbl.net:'listed' *(RWIN=8192)(10151156) |
2019-10-16 01:00:11 |
| 45.32.161.153 | attackspambots | [portscan] tcp/21 [FTP] [portscan] tcp/22 [SSH] [scan/connect: 2 time(s)] *(RWIN=1024)(10151156) |
2019-10-16 01:16:18 |
| 165.227.95.155 | attack | [portscan] tcp/21 [FTP] [scan/connect: 5 time(s)] *(RWIN=29200)(10151156) |
2019-10-16 00:51:04 |
| 77.42.121.64 | attackspambots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=56786)(10151156) |
2019-10-16 00:59:03 |
| 219.157.140.238 | attackspambots | [portscan] tcp/23 [TELNET] [scan/connect: 4 time(s)] in spfbl.net:'listed' *(RWIN=29040)(10151156) |
2019-10-16 01:03:13 |
| 84.10.24.10 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14600)(10151156) |
2019-10-16 01:13:38 |
| 187.111.23.14 | attackbotsspam | 2019-10-15T14:40:25.292566abusebot.cloudsearch.cf sshd\[7920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-111-23-14.mundivox.com user=root |
2019-10-16 01:06:15 |
| 74.142.206.154 | attackspambots | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(10151156) |
2019-10-16 00:39:14 |
| 178.57.41.45 | attack | [portscan] tcp/1433 [MsSQL] [scan/connect: 3 time(s)] *(RWIN=8192)(10151156) |
2019-10-16 01:08:11 |
| 89.42.93.173 | attackbotsspam | [portscan] tcp/1433 [MsSQL] in spfbl.net:'listed' *(RWIN=8192)(10151156) |
2019-10-16 01:13:05 |
| 103.116.86.84 | attackbots | [portscan] tcp/23 [TELNET] in sorbs:'listed [spam]' in spfbl.net:'listed' *(RWIN=14600)(10151156) |
2019-10-16 00:56:49 |
| 196.203.248.149 | attack | The IP 196.203.248.149 has just been banned by Fail2Ban after 5 attempts against sshd. Here is more information about 196.203.248.149 : % This is the AfriNIC Whois server. % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '196.203.248.0 - 196.203.251.255' % No abuse contact registered for 196.203.248.0 - 196.203.251.255 inetnum: 196.203.248.0 - 196.203.251.255 netname: TOPNET-3 descr: organisation : Topnet descr: contact name: Ahmed Kooli descr: phone: +216 71 780 900 descr: e-mail: Ahmed@topnet.tn descr: website: http://topnet.tn country: TN org: ORG-ATIA2-AFRINIC admin-c: AK34-AFRINIC tech-c: AK34-AFRINIC status: SUB-ALLOCATED PA mnt-by: AFRINIC-HM-MNT mnt-lower: ATI-MNT mnt-domains: ATI-MNT source: AFRINIC # Filtered parent: 196.203.0.0 - 196.203.255.255 organisation: ORG-ATIA2-AFRINIC org-name: ATI - Agence Tunisienne Internet org-type: LIR country: TN remarks: data has been transferred from RIPE Whois Database 20050221 address: 13, rue Jughurta, Belvedere address: Tunis 1002 phone: tel:+216-70-147-700 phone: tel:+216-71-846-100 fax-no: tel:+216-71-846-600 admin-c: JF13-AFRINIC tech-c: TG12-AFRINIC mnt-ref: AFRINIC-HM-MNT mnt-ref: ATI-MNT mnt-by: AFRINIC-HM-MNT source: AFRINIC # Filtered person: Ahmed Kooli address: Centre Urbain Nord address: 1073 Tunis address: TN phone: tel:+216-71-780-900 nic-hdl: AK34-AFRINIC mnt-by: GENERATED-4YNEP8TTA1VHG1TEIFKF5ZSZ41FGKHTS-MNT source: AFRINIC # Filtered Regards, Fail2Ban |
2019-10-16 00:55:19 |
| 37.6.244.94 | attackspambots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=29276)(10151156) |
2019-10-16 00:44:59 |
| 89.122.104.41 | attackbotsspam | [portscan] tcp/1433 [MsSQL] [scan/connect: 3 time(s)] in spfbl.net:'listed' *(RWIN=8192)(10151156) |
2019-10-16 01:12:38 |
| 139.162.110.42 | attackbots | Unauthorized connection attempt from IP address 139.162.110.42 on Port 3306(MYSQL) |
2019-10-16 01:10:00 |