城市(city): unknown
省份(region): unknown
国家(country): Brazil
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.79.137.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;189.79.137.9. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:54:21 CST 2025
;; MSG SIZE rcvd: 105
9.137.79.189.in-addr.arpa domain name pointer 189-79-137-9.dsl.telesp.net.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
9.137.79.189.in-addr.arpa name = 189-79-137-9.dsl.telesp.net.br.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 176.65.2.5 | attack | This IP address was blacklisted for the following reason: /de/jobs/fahrer-mit-fuehrerschein-ce-m-w-d/&%22%20or%20(1,2)=(select*from(select%20name_const(CHAR(76,76,82,98,78,106,75,67,102),1),name_const(CHAR(76,76,82,98,78,106,75,67,102),1))a)%20--%20%22x%22=%22x @ 2018-10-15T00:49:43+02:00. |
2019-08-05 12:22:03 |
| 14.48.127.169 | attackspam | Port Scan: UDP/36266 |
2019-08-05 12:32:56 |
| 193.201.224.246 | attack | Port Scan: TCP/443 |
2019-08-05 12:37:33 |
| 13.66.139.0 | attackspambots | Port Scan: TCP/443 |
2019-08-05 12:49:42 |
| 209.126.99.198 | attackspambots | Port Scan: TCP/445 |
2019-08-05 12:33:53 |
| 162.155.179.211 | attackbots | proto=tcp . spt=39376 . dpt=25 . (listed on Blocklist de Aug 04) (717) |
2019-08-05 13:06:17 |
| 141.212.123.191 | attack | Port Scan: UDP/53 |
2019-08-05 11:56:37 |
| 74.208.129.88 | attackbotsspam | Port Scan: TCP/445 |
2019-08-05 12:27:07 |
| 106.111.165.41 | attack | Port Scan: TCP/2323 |
2019-08-05 12:24:40 |
| 100.43.216.234 | attack | Port Scan: UDP/137 |
2019-08-05 12:25:32 |
| 201.163.176.188 | attack | Port Scan: TCP/445 |
2019-08-05 12:34:47 |
| 187.95.38.17 | attackbots | email spam |
2019-08-05 12:58:12 |
| 74.62.139.158 | attackspambots | Port Scan: UDP/137 |
2019-08-05 12:45:29 |
| 137.117.44.14 | attack | Port Scan: TCP/445 |
2019-08-05 12:40:36 |
| 72.11.140.155 | attackbotsspam | Web app attack attempts, scanning for vulnerability. Date: 2019 Aug 05. 05:52:24 Source IP: 72.11.140.155 Portion of the log(s): 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] "GET /xb9987.php HTTP/1.1" 404 548 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)" 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] POST /assets/modules/evogallery/js/uploadify/uploadify.php 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] POST /assets/modules/evogallery/js/uploadify/uploadify.php 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] POST /assets/modules/evogallery/js/uploadify/uploadify.php 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] GET /xb9987.php 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] GET /xb9987.php 72.11.140.155 - [05/Aug/2019:05:52:24 +0200] POST /assets/modules/evogallery/js/uploadify/uploadify.php 72.11.140.155 - [05/Aug/2019:05:52:23 +0200] POST /assets/modules/evogallery/js/uploadify/uploadify.php 72.11.140.155 - [05/Aug/2019:05:52:23 +0200] GET /xb9987.php .... |
2019-08-05 12:46:02 |