城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.145.143.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;208.145.143.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 16:43:57 CST 2025
;; MSG SIZE rcvd: 107
Host 81.143.145.208.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.143.145.208.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 31.47.43.139 | attackspam | Unauthorized connection attempt from IP address 31.47.43.139 on Port 445(SMB) |
2020-03-25 20:03:12 |
| 185.176.27.26 | attack | 03/25/2020-07:39:51.010119 185.176.27.26 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-25 20:19:19 |
| 222.186.15.236 | attackspam | firewall-block, port(s): 22/tcp |
2020-03-25 20:04:38 |
| 88.214.26.53 | attackspambots | firewall-block, port(s): 45689/tcp |
2020-03-25 19:57:07 |
| 74.82.47.50 | attackbots | 30005/tcp 873/tcp 6379/tcp... [2020-01-24/03-25]18pkt,9pt.(tcp),1pt.(udp) |
2020-03-25 19:59:02 |
| 222.186.19.221 | attack | SIP/5060 Probe, BF, Hack - |
2020-03-25 20:04:15 |
| 192.99.152.160 | attack | SIP/5060 Probe, BF, Hack - |
2020-03-25 20:13:03 |
| 94.102.56.215 | attack | Port 41046 scan denied |
2020-03-25 20:31:57 |
| 49.51.12.25 | attackspambots | Unauthorized connection attempt detected from IP address 49.51.12.25 to port 5001 |
2020-03-25 20:01:02 |
| 193.226.218.75 | attack | Port 9222 scan denied |
2020-03-25 20:12:33 |
| 92.118.37.99 | attackspam | scans 13 times in preceeding hours on the ports (in chronological order) 30911 31711 32011 30811 36211 37211 30411 33011 37211 37011 34711 26611 26311 resulting in total of 29 scans from 92.118.37.0/24 block. |
2020-03-25 20:33:59 |
| 45.143.221.50 | attackspambots | none |
2020-03-25 20:01:24 |
| 203.130.242.68 | attackspambots | Mar 25 13:32:11 pkdns2 sshd\[53985\]: Invalid user asakura from 203.130.242.68Mar 25 13:32:14 pkdns2 sshd\[53985\]: Failed password for invalid user asakura from 203.130.242.68 port 40140 ssh2Mar 25 13:36:31 pkdns2 sshd\[54192\]: Invalid user kj from 203.130.242.68Mar 25 13:36:33 pkdns2 sshd\[54192\]: Failed password for invalid user kj from 203.130.242.68 port 48023 ssh2Mar 25 13:41:00 pkdns2 sshd\[54404\]: Invalid user politia from 203.130.242.68Mar 25 13:41:02 pkdns2 sshd\[54404\]: Failed password for invalid user politia from 203.130.242.68 port 55908 ssh2 ... |
2020-03-25 20:07:02 |
| 93.174.95.106 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 2480 resulting in total of 5 scans from 93.174.88.0/21 block. |
2020-03-25 20:32:59 |
| 77.247.110.58 | attackbotsspam | Port 5636 scan denied |
2020-03-25 20:43:27 |