城市(city): Bauru
省份(region): Sao Paulo
国家(country): Brazil
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): ULTRAWAVE TELECOM EIRELI
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.52.21.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64065
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.52.21.134. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082401 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 01:50:00 CST 2019
;; MSG SIZE rcvd: 117
134.21.52.200.in-addr.arpa domain name pointer 200-52-21-134.dynamic.ultrawave.com.br.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
134.21.52.200.in-addr.arpa name = 200-52-21-134.dynamic.ultrawave.com.br.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.133.115.222 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-26 23:11:16 |
| 185.209.0.69 | attackspam | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(05261127) |
2020-05-26 23:06:20 |
| 106.203.25.121 | attack | C1,WP GET /wp-login.php |
2020-05-26 23:35:41 |
| 113.21.68.249 | attackbotsspam | 1590478085 - 05/26/2020 09:28:05 Host: 113.21.68.249/113.21.68.249 Port: 445 TCP Blocked |
2020-05-26 22:57:56 |
| 195.54.160.159 | attack | Port scan: Attack repeated for 24 hours |
2020-05-26 23:25:20 |
| 36.235.0.42 | attackspambots | 23/tcp [2020-05-26]1pkt |
2020-05-26 23:27:06 |
| 1.52.29.165 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-26 23:37:41 |
| 41.139.132.238 | attackbots | Brute force against mail service (dovecot) |
2020-05-26 23:06:50 |
| 216.218.206.98 | attackspambots | srv02 Mass scanning activity detected Target: 1883 .. |
2020-05-26 23:34:14 |
| 189.7.217.23 | attackspambots | Brute-force attempt banned |
2020-05-26 23:40:28 |
| 180.214.182.13 | attackspambots | May 26 09:28:04 debian-2gb-nbg1-2 kernel: \[12736884.624048\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.214.182.13 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=44 ID=48962 PROTO=TCP SPT=6694 DPT=8080 WINDOW=15689 RES=0x00 SYN URGP=0 |
2020-05-26 22:56:53 |
| 185.209.0.64 | attack | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(05261127) |
2020-05-26 23:09:31 |
| 125.41.129.217 | attackbots | Port probing on unauthorized port 23 |
2020-05-26 23:10:16 |
| 170.0.21.44 | attackspam | Fail2Ban Ban Triggered |
2020-05-26 23:00:43 |
| 222.186.15.158 | attackspam | Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22 |
2020-05-26 23:19:30 |