城市(city): unknown
省份(region): unknown
国家(country): Reserved
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 231.195.42.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;231.195.42.139. IN A
;; AUTHORITY SECTION:
. 536 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019092800 1800 900 604800 86400
;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 28 23:07:02 CST 2019
;; MSG SIZE rcvd: 118
Host 139.42.195.231.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.42.195.231.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 194.26.29.117 | attackspam | scans 36 times in preceeding hours on the ports (in chronological order) 10265 10384 10691 10574 10551 10482 10960 10702 10556 10407 10470 10477 10725 10242 10625 10038 10183 10494 10505 10411 10780 10402 10711 10792 10602 10552 10982 10511 10361 10734 10788 10010 10747 10628 10394 10142 resulting in total of 612 scans from 194.26.29.0/24 block. |
2020-06-07 02:30:54 |
| 185.39.11.39 | attackspam |
|
2020-06-07 02:40:33 |
| 213.217.0.101 | attack |
|
2020-06-07 02:25:30 |
| 58.188.221.13 | attackbotsspam | scans 2 times in preceeding hours on the ports (in chronological order) 17621 17621 |
2020-06-07 02:22:49 |
| 185.175.93.104 | attackbotsspam |
|
2020-06-07 02:36:35 |
| 194.26.29.132 | attack | scans 40 times in preceeding hours on the ports (in chronological order) 2301 2330 2828 2979 2956 2683 2865 2422 2357 2426 2658 2663 2160 2832 2776 2583 2441 2321 2453 2271 2905 2361 2727 2330 2289 2932 2223 2330 2652 2549 2961 2897 2367 2801 2763 2181 2862 2911 2694 2861 resulting in total of 612 scans from 194.26.29.0/24 block. |
2020-06-07 02:29:54 |
| 194.26.29.118 | attackspambots | scans 45 times in preceeding hours on the ports (in chronological order) 1249 1262 1897 1050 1237 1986 1222 1585 1262 1260 1986 1542 1926 1031 1823 1210 1419 1992 1565 1243 1166 1102 1780 1241 1104 1123 1815 1278 1955 1450 1038 1927 1372 1548 1473 1420 1360 1460 1124 1421 1108 1527 1436 1966 1895 resulting in total of 612 scans from 194.26.29.0/24 block. |
2020-06-07 02:30:35 |
| 89.248.172.85 | attackbotsspam | 06/06/2020-14:51:19.090323 89.248.172.85 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-06-07 02:55:06 |
| 162.243.144.212 | attackbots | scans once in preceeding hours on the ports (in chronological order) 2376 resulting in total of 34 scans from 162.243.0.0/16 block. |
2020-06-07 02:46:52 |
| 92.63.196.3 | attackspam | scans 60 times in preceeding hours on the ports (in chronological order) 7889 2089 3328 7005 3348 3382 3377 1234 3359 3318 5989 3364 3363 3316 2089 1989 8080 3003 3399 3331 8008 6489 3089 55555 3989 2020 5689 3327 3372 4001 3352 1689 4000 6003 3030 9989 8089 3358 5678 3379 3369 2489 4989 9002 3351 3889 3331 33898 2689 5002 2789 3347 3387 5889 4040 5003 3319 2589 4389 3328 resulting in total of 60 scans from 92.63.196.0/24 block. |
2020-06-07 02:54:08 |
| 121.254.125.211 | attackbots | Brute-force attempt banned |
2020-06-07 02:21:27 |
| 49.232.30.175 | attackbots | Jun 6 15:33:12 jane sshd[4970]: Failed password for root from 49.232.30.175 port 45896 ssh2 ... |
2020-06-07 02:23:19 |
| 185.153.196.225 | attackspambots | 06/06/2020-13:48:23.076347 185.153.196.225 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-07 02:39:10 |
| 77.247.108.119 | attackbots | Unauthorized connection attempt detected from IP address 77.247.108.119 to port 443 |
2020-06-07 02:22:20 |
| 192.241.194.171 | attackspam | 1591452099 - 06/06/2020 16:01:39 Host: 192.241.194.171/192.241.194.171 Port: 20 TCP Blocked |
2020-06-07 02:31:47 |