城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.55.248.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;23.55.248.212. IN A
;; AUTHORITY SECTION:
. 435 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:03:03 CST 2022
;; MSG SIZE rcvd: 106
212.248.55.23.in-addr.arpa domain name pointer a23-55-248-212.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
212.248.55.23.in-addr.arpa name = a23-55-248-212.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 98.231.109.153 | attack | Honeypot attack, port: 81, PTR: c-98-231-109-153.hsd1.fl.comcast.net. |
2020-01-28 06:14:46 |
| 91.65.124.129 | attack | 2019-07-09 14:41:16 1hkpQp-0002D8-BA SMTP connection from ip5b417c81.dynamic.kabel-deutschland.de \[91.65.124.129\]:10775 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 14:41:22 1hkpQv-0002DO-Tr SMTP connection from ip5b417c81.dynamic.kabel-deutschland.de \[91.65.124.129\]:10826 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 14:41:28 1hkpR1-0002DT-9O SMTP connection from ip5b417c81.dynamic.kabel-deutschland.de \[91.65.124.129\]:10873 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 06:30:14 |
| 91.234.128.203 | attack | 2019-03-11 11:28:16 1h3IAG-0004HB-F8 SMTP connection from 91-234-128-203.net.hlg.com.pl \[91.234.128.203\]:11387 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 11:28:52 1h3IAr-0004IB-FU SMTP connection from 91-234-128-203.net.hlg.com.pl \[91.234.128.203\]:11519 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 11:29:26 1h3IBO-0004Jf-Jx SMTP connection from 91-234-128-203.net.hlg.com.pl \[91.234.128.203\]:11641 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 06:46:00 |
| 190.77.121.141 | attackspambots | Unauthorized connection attempt detected from IP address 190.77.121.141 to port 81 [J] |
2020-01-28 06:16:06 |
| 91.69.13.69 | attackspambots | 2020-01-24 13:02:04 1iuxf1-0001O6-Kk SMTP connection from 69.13.69.91.rev.sfr.net \[91.69.13.69\]:49851 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 13:02:19 1iuxfG-0001OP-PA SMTP connection from 69.13.69.91.rev.sfr.net \[91.69.13.69\]:49968 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 13:02:35 1iuxfV-0001Ol-Hr SMTP connection from 69.13.69.91.rev.sfr.net \[91.69.13.69\]:10073 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 06:28:19 |
| 187.167.198.233 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-28 06:10:53 |
| 94.178.89.58 | attackbots | Honeypot attack, port: 445, PTR: 58-89-178-94.pool.ukrtel.net. |
2020-01-28 06:13:30 |
| 223.240.70.4 | attackspambots | Unauthorized connection attempt detected from IP address 223.240.70.4 to port 2220 [J] |
2020-01-28 06:41:45 |
| 134.249.150.86 | attack | Honeypot attack, port: 445, PTR: 134-249-150-86.broadband.kyivstar.net. |
2020-01-28 06:25:51 |
| 201.68.93.240 | attackbotsspam | Honeypot attack, port: 4567, PTR: 201-68-93-240.dsl.telesp.net.br. |
2020-01-28 06:27:27 |
| 92.109.205.90 | attackspam | 2020-01-24 10:52:06 1iuvdE-0004ix-SF SMTP connection from 92-109-205-90.cable.dynamic.v4.ziggo.nl \[92.109.205.90\]:10530 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 10:52:29 1iuvdc-0004ja-9b SMTP connection from 92-109-205-90.cable.dynamic.v4.ziggo.nl \[92.109.205.90\]:10744 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 10:52:42 1iuvdp-0004jt-NB SMTP connection from 92-109-205-90.cable.dynamic.v4.ziggo.nl \[92.109.205.90\]:10864 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 06:14:02 |
| 91.243.203.121 | attackspambots | 2019-03-13 07:20:09 H=\(\[91.243.203.121\]\) \[91.243.203.121\]:16504 I=\[193.107.88.166\]:25 F=\ |
2020-01-28 06:41:06 |
| 91.99.107.100 | attackbotsspam | 2019-06-22 13:04:22 1hedoh-000399-SS SMTP connection from \(91.99.107.100.parsonline.net\) \[91.99.107.100\]:42348 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 13:04:35 1hedos-00039M-NG SMTP connection from \(91.99.107.100.parsonline.net\) \[91.99.107.100\]:42454 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 13:04:48 1hedp4-00039a-Ro SMTP connection from \(91.99.107.100.parsonline.net\) \[91.99.107.100\]:42535 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 06:18:17 |
| 61.247.142.31 | attack | Port 4567 scan denied |
2020-01-28 06:12:32 |
| 219.138.150.220 | attackbots | 22/tcp [2020-01-27]1pkt |
2020-01-28 06:10:22 |