城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.222.212.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.222.212.11. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:01:41 CST 2025
;; MSG SIZE rcvd: 107
11.212.222.203.in-addr.arpa domain name pointer dhcp-ubr3-6541.csf.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.212.222.203.in-addr.arpa name = dhcp-ubr3-6541.csf.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.238.198.114 | attackspam | SSH on non-standard port |
2019-11-11 01:54:53 |
| 80.82.70.239 | attackbots | firewall-block, port(s): 7304/tcp |
2019-11-11 02:27:39 |
| 81.22.45.133 | attackbots | firewall-block, port(s): 3391/tcp, 3394/tcp, 3399/tcp |
2019-11-11 02:26:33 |
| 114.246.204.22 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:20:22 |
| 81.22.45.203 | attackspambots | Nov 9 09:20:38 SRC=81.22.45.203 PROTO=TCP SPT=55932 DPT=11016 Nov 9 10:04:43 SRC=81.22.45.203 PROTO=TCP SPT=55932 DPT=11014 Nov 9 13:46:39 SRC=81.22.45.203 PROTO=TCP SPT=55932 DPT=11011 Nov 9 14:59:36 SRC=81.22.45.203 PROTO=TCP SPT=55932 DPT=11012 Nov 9 15:14:37 SRC=81.22.45.203 PROTO=TCP SPT=55932 DPT=11020 |
2019-11-11 02:26:03 |
| 221.148.193.205 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 01:54:27 |
| 164.132.5.186 | attackspam | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2019-11-11 02:17:45 |
| 103.206.129.101 | attackspam | Fail2Ban Ban Triggered |
2019-11-11 02:00:53 |
| 89.248.160.193 | attackbotsspam | Port Scan: TCP/6421 |
2019-11-11 02:24:32 |
| 222.230.136.161 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:09:20 |
| 119.40.55.14 | attackspambots | 11/10/2019-12:06:25.533164 119.40.55.14 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-11 01:58:40 |
| 59.144.137.134 | attackbots | 2019-11-10T17:10:48.128997abusebot-2.cloudsearch.cf sshd\[18800\]: Invalid user 123456 from 59.144.137.134 port 35174 |
2019-11-11 02:29:56 |
| 159.203.201.137 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 37416 proto: TCP cat: Misc Attack |
2019-11-11 02:18:16 |
| 111.160.205.58 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:20:55 |
| 81.22.45.48 | attack | 11/10/2019-13:11:14.054259 81.22.45.48 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-11 02:26:49 |