城市(city): unknown
省份(region): unknown
国家(country): Sri Lanka
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.247.253.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.247.253.21. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 06:11:33 CST 2025
;; MSG SIZE rcvd: 107
21.253.247.220.in-addr.arpa domain name pointer 21.253.sta.illlan.slt.lk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.253.247.220.in-addr.arpa name = 21.253.sta.illlan.slt.lk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 84.244.105.136 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14600)(10151156) |
2019-10-16 01:31:59 |
| 79.111.163.253 | attackspambots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=40532)(10151156) |
2019-10-16 01:32:26 |
| 51.255.234.209 | attack | Oct 15 20:06:38 pkdns2 sshd\[39306\]: Invalid user p3g@s!51 from 51.255.234.209Oct 15 20:06:39 pkdns2 sshd\[39306\]: Failed password for invalid user p3g@s!51 from 51.255.234.209 port 54960 ssh2Oct 15 20:10:41 pkdns2 sshd\[39505\]: Invalid user safeuser from 51.255.234.209Oct 15 20:10:44 pkdns2 sshd\[39505\]: Failed password for invalid user safeuser from 51.255.234.209 port 37596 ssh2Oct 15 20:14:40 pkdns2 sshd\[39658\]: Invalid user sparky1234 from 51.255.234.209Oct 15 20:14:42 pkdns2 sshd\[39658\]: Failed password for invalid user sparky1234 from 51.255.234.209 port 48460 ssh2 ... |
2019-10-16 01:35:29 |
| 151.41.84.108 | attackspam | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=15023)(10151156) |
2019-10-16 01:09:29 |
| 71.6.232.4 | attack | Unauthorized connection attempt from IP address 71.6.232.4 on Port 587(SMTP-MSA) |
2019-10-16 01:14:13 |
| 222.252.216.200 | attackbots | [portscan] tcp/1433 [MsSQL] in sorbs:'listed [web]' in spfbl.net:'listed' *(RWIN=8192)(10151156) |
2019-10-16 01:18:26 |
| 213.171.37.45 | attackspambots | [portscan] tcp/1433 [MsSQL] in sorbs:'listed [http], [socks], [misc]' *(RWIN=1024)(10151156) |
2019-10-16 01:38:52 |
| 187.190.26.138 | attackspam | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(10151156) |
2019-10-16 01:22:28 |
| 216.218.206.94 | attack | [portscan] udp/500 [isakmp] *(RWIN=-)(10151156) |
2019-10-16 01:03:31 |
| 103.16.199.169 | attackbots | [portscan] tcp/21 [FTP] [scan/connect: 5 time(s)] in blocklist.de:'listed [ftp]' in spfbl.net:'listed' *(RWIN=29200)(10151156) |
2019-10-16 00:57:16 |
| 118.88.71.216 | attack | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=43052)(10151156) |
2019-10-16 01:10:32 |
| 42.61.163.60 | attackbots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=1445)(10151156) |
2019-10-16 01:16:36 |
| 2.182.15.240 | attackbots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=14600)(10151156) |
2019-10-16 01:17:33 |
| 93.67.178.101 | attackspambots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=40285)(10151156) |
2019-10-16 01:31:32 |
| 49.88.156.15 | attackbotsspam | [portscan] tcp/3389 [MS RDP] in spfbl.net:'listed' *(RWIN=29200)(10151156) |
2019-10-16 01:36:20 |