城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.34.2.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;180.34.2.11. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:02:34 CST 2025
;; MSG SIZE rcvd: 104
11.2.34.180.in-addr.arpa domain name pointer p5294011-ipxg23901hodogaya.kanagawa.ocn.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.2.34.180.in-addr.arpa name = p5294011-ipxg23901hodogaya.kanagawa.ocn.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 94.102.56.181 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 4267 proto: TCP cat: Misc Attack |
2020-02-27 01:19:22 |
| 80.82.78.100 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 70 - port: 129 proto: UDP cat: Misc Attack |
2020-02-27 01:27:44 |
| 185.175.93.34 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2020-02-27 01:10:18 |
| 162.243.134.233 | attackbotsspam | 5093/udp 636/tcp 27019/tcp... [2020-02-14/25]13pkt,11pt.(tcp),2pt.(udp) |
2020-02-27 01:50:33 |
| 172.105.211.153 | attackspambots | " " |
2020-02-27 01:14:00 |
| 185.176.27.122 | attack | 02/26/2020-12:37:36.571585 185.176.27.122 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-27 01:42:51 |
| 185.175.93.101 | attack | ET DROP Dshield Block Listed Source group 1 - port: 5907 proto: TCP cat: Misc Attack |
2020-02-27 01:09:15 |
| 89.248.172.85 | attackspambots | Automatic report - Port Scan |
2020-02-27 01:22:36 |
| 172.105.192.195 | attackbotsspam | scans 1 times in preceeding hours on the ports (in chronological order) 9999 resulting in total of 6 scans from 172.104.0.0/15 block. |
2020-02-27 01:14:45 |
| 195.54.167.218 | attack | scans 10 times in preceeding hours on the ports (in chronological order) 42375 42396 42277 42042 42252 42231 42324 42451 42234 42407 resulting in total of 85 scans from 195.54.167.0/24 block. |
2020-02-27 01:38:10 |
| 80.82.77.33 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 6969 proto: UDP cat: Misc Attack |
2020-02-27 01:29:10 |
| 195.54.167.217 | attackbots | scans 16 times in preceeding hours on the ports (in chronological order) 41058 41835 41772 41134 41147 41364 41802 41143 41505 41344 41819 41764 41435 41923 41144 41935 resulting in total of 85 scans from 195.54.167.0/24 block. |
2020-02-27 01:38:34 |
| 89.248.168.217 | attackbots | Port 514 scan denied |
2020-02-27 01:23:34 |
| 162.243.135.165 | attackspambots | ssh brute force |
2020-02-27 01:49:37 |
| 92.63.196.9 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 39544 proto: TCP cat: Misc Attack |
2020-02-27 01:21:42 |