城市(city): Boardman
省份(region): Oregon
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.246.42.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.246.42.72. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:19:55 CST 2025
;; MSG SIZE rcvd: 105
72.42.246.18.in-addr.arpa domain name pointer ec2-18-246-42-72.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
72.42.246.18.in-addr.arpa name = ec2-18-246-42-72.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 71.6.147.254 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 59 - port: 8829 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:39:30 |
| 172.104.127.116 | attackspambots | GPL SNMP public access udp - port: 161 proto: snmp cat: Attempted Information Leakbytes: 96 |
2020-08-27 02:48:55 |
| 80.82.78.39 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 8089 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:39:11 |
| 94.23.210.200 | attack | Detected by ModSecurity. Request URI: /wp-login.php |
2020-08-27 02:49:14 |
| 66.249.66.220 | attackspambots | Automatic report - Banned IP Access |
2020-08-27 03:06:14 |
| 180.163.220.4 | attack | CF RAY ID: 5c8ce37c4a7ceb89 IP Class: unknown URI: / |
2020-08-27 02:48:42 |
| 94.102.51.95 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 34348 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:35:38 |
| 223.155.99.241 | attackspam | Unauthorised access (Aug 26) SRC=223.155.99.241 LEN=52 TOS=0x02 TTL=115 ID=4677 DF TCP DPT=1433 WINDOW=8192 CWR ECE SYN |
2020-08-27 02:46:54 |
| 88.214.58.154 | attackbotsspam | [portscan] Port scan |
2020-08-27 03:00:15 |
| 36.111.182.49 | attack | Failed password for invalid user t from 36.111.182.49 port 33154 ssh2 |
2020-08-27 02:46:21 |
| 203.192.253.89 | attackspambots | Automatic report - XMLRPC Attack |
2020-08-27 03:07:56 |
| 51.159.95.5 | attackbots |
|
2020-08-27 02:40:29 |
| 185.234.216.87 | attackspambots | RBL listed IP. Trying to send Spam. IP autobanned |
2020-08-27 02:56:44 |
| 94.23.160.207 | attack | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-27 02:35:52 |
| 83.97.20.29 | attack | Aug 26 20:51:58 www postfix/smtpd\[6326\]: lost connection after CONNECT from 29.20.97.83.ro.ovo.sc\[83.97.20.29\] |
2020-08-27 02:53:26 |