城市(city): unknown
省份(region): unknown
国家(country): Denmark
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.130.33.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.130.33.11. IN A
;; AUTHORITY SECTION:
. 549 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:10:51 CST 2022
;; MSG SIZE rcvd: 104
11.33.130.2.in-addr.arpa domain name pointer 002130033011.mbb.telenor.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.33.130.2.in-addr.arpa name = 002130033011.mbb.telenor.dk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.172.113.221 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 2046 resulting in total of 9 scans from 167.172.0.0/16 block. |
2020-05-07 02:39:44 |
| 185.176.27.26 | attackbots | 05/06/2020-14:04:57.804730 185.176.27.26 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-07 02:33:48 |
| 49.204.73.186 | attack | scans 15 times in preceeding hours on the ports (in chronological order) 1987 1987 1987 1987 1987 2222 2222 2222 2222 2222 22222 12222 12222 12222 12222 |
2020-05-07 02:21:50 |
| 119.148.19.153 | attackspam | probes 6 times on the port 8080 8088 9200 |
2020-05-07 02:13:30 |
| 167.172.148.56 | attackbots | 22802/tcp 16173/tcp 30051/tcp... [2020-04-12/05-06]68pkt,24pt.(tcp) |
2020-05-07 02:38:51 |
| 184.105.139.117 | attackbots | 11211/tcp 5555/tcp 9200/tcp... [2020-03-08/05-06]37pkt,8pt.(tcp),3pt.(udp) |
2020-05-07 02:36:08 |
| 5.101.0.209 | attack | Unauthorized connection attempt detected from IP address 5.101.0.209 to port 443 |
2020-05-07 02:26:24 |
| 113.214.30.171 | attack | " " |
2020-05-07 02:14:16 |
| 125.64.94.220 | attackbots | [21:00:38] (YnM): [21:00:36] Telnet connection: 125.64.94.220/49200 [21:00:39] (YnM): [21:00:36] EOF ident connection [21:00:39] (YnM): [21:00:36] Refused telnet@125.64.94.220 (invalid handle: GET / HTTP/1.0) |
2020-05-07 02:12:39 |
| 5.101.151.82 | attackspambots | 2020-05-06T19:27:19.405744mail.broermann.family sshd[10310]: Invalid user oracle from 5.101.151.82 port 53798 2020-05-06T19:27:21.538889mail.broermann.family sshd[10310]: Failed password for invalid user oracle from 5.101.151.82 port 53798 ssh2 2020-05-06T19:27:33.015469mail.broermann.family sshd[10317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.82 user=root 2020-05-06T19:27:34.926149mail.broermann.family sshd[10317]: Failed password for root from 5.101.151.82 port 57876 ssh2 2020-05-06T19:27:46.356414mail.broermann.family sshd[10321]: Invalid user postgres from 5.101.151.82 port 33700 ... |
2020-05-07 02:00:04 |
| 194.26.29.116 | attackspam | scans 189 times in preceeding hours on the ports (in chronological order) 43463 43357 47226 42111 42398 44691 42567 44819 45244 47070 42298 43236 46079 44754 46754 46632 47415 44150 44945 47649 46407 42302 42769 43174 45411 43229 43583 42237 43144 42176 47712 46535 42566 44384 46346 45249 46633 44945 47272 43040 45057 42947 47131 44085 42172 43727 42881 43245 46924 42781 44563 43626 43601 42749 47147 46785 43432 45535 44272 42652 43857 47454 44639 45739 46470 42970 47513 43473 47320 43475 44830 44472 43159 47415 45649 42117 43545 46598 47771 44137 43640 45059 45348 46446 47269 43441 43479 43747 44809 46897 42357 43540 45865 42942 43293 43572 43419 46750 46759 43686 45987 45120 42688 43349 42116 43477 45087 42831 43569 43315 46698 45303 47663 44230 42276 47350 42472 44807 46077 43500 46559 46887 44588 45253 42686 46535 46626 42105 44750 43502 45592 42789 45130 47023 45002 43278 43352 42337 47314 47478 45283 43560 45218 43755 46954 43751 46574 47726 46943 46815 45792 47070 47708 42724 43701 44872 43416 43380 45 |
2020-05-07 02:02:17 |
| 185.176.27.30 | attack | 05/06/2020-13:48:57.715675 185.176.27.30 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-07 02:33:33 |
| 185.200.118.48 | attackspambots | Repeatedly attempts to connect to port 1194 |
2020-05-07 02:05:20 |
| 185.176.27.62 | attack | Port scan on 6 port(s): 3382 3396 3397 5555 9999 41255 |
2020-05-07 02:33:00 |
| 185.135.83.179 | attackspambots | 185.135.83.179 - - [06/May/2020:21:59:23 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-05-07 02:09:38 |