城市(city): unknown
省份(region): unknown
国家(country): Portugal
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.83.252.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.83.252.83. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:29:44 CST 2025
;; MSG SIZE rcvd: 104
83.252.83.2.in-addr.arpa domain name pointer bl22-252-83.dsl.telepac.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
83.252.83.2.in-addr.arpa name = bl22-252-83.dsl.telepac.pt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 77.247.109.35 | attackspam | \[2019-07-28 07:28:40\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-28T07:28:40.207-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470519",SessionID="0x7ff4d004fe18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.35/50815",ACLName="no_extension_match" \[2019-07-28 07:30:01\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-28T07:30:01.596-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441519470519",SessionID="0x7ff4d004fe18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.35/63901",ACLName="no_extension_match" \[2019-07-28 07:31:21\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-28T07:31:21.552-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="001441519470519",SessionID="0x7ff4d051f0b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.35/59029",ACLName="no_ex |
2019-07-28 19:41:15 |
| 172.217.8.174 | attackbotsspam | duplication of google */google usually is hacking dev/IT/ISP online services industry/unregulated employees/anyone can be GSTATIC.COM MANAGING this site/duplicated - most hacking via fake com.apple.WebKit.Networking.Xpc the X is static.com/pc tampering with office pc/tampered with tvs/cameras/dvr/freesat boxes/sky boxes and virgninmedia.com - big fraud going on/free service -courtesy of unregulated IT/dev/online web workers/duplicating with capital replacement/monitor IT/ISP taking over countries -review existing laws/paper has limitations but online version doesn't -ad web workers another death threat/fire hydrant from Mac i.e. cyrmu campervan/boat hackers /already known them |
2019-07-28 19:17:48 |
| 167.71.60.104 | attackspam | *Port Scan* detected from 167.71.60.104 (DE/Germany/-). 4 hits in the last 85 seconds |
2019-07-28 19:14:37 |
| 13.234.110.192 | attackspambots | 3389BruteforceFW23 |
2019-07-28 19:44:31 |
| 187.33.48.56 | attackspambots | Unauthorized connection attempt from IP address 187.33.48.56 on Port 445(SMB) |
2019-07-28 20:07:31 |
| 203.94.73.160 | attack | Unauthorized connection attempt from IP address 203.94.73.160 on Port 445(SMB) |
2019-07-28 19:53:09 |
| 45.227.253.214 | attack | Jul 28 13:38:22 mail postfix/smtpd\[30231\]: warning: unknown\[45.227.253.214\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 28 13:38:40 mail postfix/smtpd\[30459\]: warning: unknown\[45.227.253.214\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 28 13:38:45 mail postfix/smtpd\[24958\]: warning: unknown\[45.227.253.214\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-07-28 19:48:04 |
| 93.189.44.62 | attackspam | Unauthorized connection attempt from IP address 93.189.44.62 on Port 445(SMB) |
2019-07-28 19:56:02 |
| 143.0.191.246 | attackspam | Automatic report - Port Scan Attack |
2019-07-28 19:24:57 |
| 187.28.50.230 | attackbots | Automatic report |
2019-07-28 19:31:08 |
| 139.59.92.57 | attackspam | 139.59.92.57 - - [28/Jul/2019:13:31:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.92.57 - - [28/Jul/2019:13:31:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.92.57 - - [28/Jul/2019:13:31:08 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.92.57 - - [28/Jul/2019:13:31:11 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.92.57 - - [28/Jul/2019:13:31:11 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.92.57 - - [28/Jul/2019:13:31:23 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-28 19:40:29 |
| 185.108.240.10 | attackbotsspam | Unauthorized connection attempt from IP address 185.108.240.10 on Port 445(SMB) |
2019-07-28 20:04:31 |
| 207.46.13.100 | attackbots | Automatic report - Banned IP Access |
2019-07-28 19:22:30 |
| 14.200.238.88 | attack | 20 attempts against mh-ssh on ice.magehost.pro |
2019-07-28 19:49:19 |
| 220.248.17.34 | attackspambots | SSH bruteforce |
2019-07-28 19:28:47 |