城市(city): San Francisco
省份(region): California
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.233.238.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;209.233.238.220. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070701 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 08 02:20:53 CST 2025
;; MSG SIZE rcvd: 108
220.238.233.209.in-addr.arpa domain name pointer adsl-209-233-238-220.dsl.snfc21.pacbell.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.238.233.209.in-addr.arpa name = adsl-209-233-238-220.dsl.snfc21.pacbell.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 107.6.183.226 | attack | Unauthorized connection attempt detected from IP address 107.6.183.226 to port 53 [J] |
2020-01-14 19:36:33 |
| 153.99.181.45 | attackspam | Unauthorized connection attempt detected from IP address 153.99.181.45 to port 1433 [J] |
2020-01-14 19:55:51 |
| 92.240.57.214 | attack | SSH/22 MH Probe, BF, Hack - |
2020-01-14 19:39:37 |
| 114.34.101.37 | attackspam | Unauthorized connection attempt detected from IP address 114.34.101.37 to port 82 [J] |
2020-01-14 19:58:25 |
| 27.15.192.70 | attackspambots | Unauthorized connection attempt detected from IP address 27.15.192.70 to port 23 [J] |
2020-01-14 19:49:18 |
| 125.165.88.55 | attackbotsspam | Unauthorized connection attempt detected from IP address 125.165.88.55 to port 80 [J] |
2020-01-14 19:56:30 |
| 188.113.174.55 | attack | Unauthorized connection attempt detected from IP address 188.113.174.55 to port 2220 [J] |
2020-01-14 20:08:42 |
| 209.97.175.96 | attack | Unauthorized connection attempt detected from IP address 209.97.175.96 to port 2220 [J] |
2020-01-14 20:06:37 |
| 85.112.70.200 | attackspam | Unauthorized connection attempt detected from IP address 85.112.70.200 to port 8080 [J] |
2020-01-14 19:42:37 |
| 124.156.64.236 | attackspam | Unauthorized connection attempt detected from IP address 124.156.64.236 to port 7676 [J] |
2020-01-14 19:34:29 |
| 170.106.81.53 | attackspam | Unauthorized connection attempt detected from IP address 170.106.81.53 to port 989 [J] |
2020-01-14 19:54:26 |
| 222.186.175.154 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Failed password for root from 222.186.175.154 port 27046 ssh2 Failed password for root from 222.186.175.154 port 27046 ssh2 Failed password for root from 222.186.175.154 port 27046 ssh2 Failed password for root from 222.186.175.154 port 27046 ssh2 |
2020-01-14 19:50:51 |
| 138.118.214.12 | attack | SMB Server BruteForce Attack |
2020-01-14 19:56:14 |
| 222.82.49.249 | attackspam | Unauthorized connection attempt detected from IP address 222.82.49.249 to port 80 [J] |
2020-01-14 19:51:16 |
| 183.88.132.83 | attackbotsspam | Unauthorized connection attempt detected from IP address 183.88.132.83 to port 5555 [J] |
2020-01-14 19:32:51 |