城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.55.13.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.55.13.66. IN A
;; AUTHORITY SECTION:
. 391 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 17:46:12 CST 2022
;; MSG SIZE rcvd: 105
Host 66.13.55.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.13.55.253.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.62.18.252 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 24 - port: 1433 proto: TCP cat: Misc Attack |
2020-06-21 07:11:08 |
| 144.172.79.8 | attack | Brute force attempt |
2020-06-21 07:02:15 |
| 185.53.88.21 | attack | Jun 20 22:58:11 debian-2gb-nbg1-2 kernel: \[14945374.753974\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.53.88.21 DST=195.201.40.59 LEN=440 TOS=0x00 PREC=0x00 TTL=54 ID=9094 DF PROTO=UDP SPT=5083 DPT=5060 LEN=420 |
2020-06-21 06:38:29 |
| 51.79.149.123 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 46148 proto: UDP cat: Misc Attack |
2020-06-21 06:51:14 |
| 104.238.73.216 | spamattack | phising scam |
2020-06-21 07:03:34 |
| 79.124.62.82 | attack |
|
2020-06-21 07:07:33 |
| 193.37.255.114 | attack |
|
2020-06-21 07:14:14 |
| 185.156.73.52 | attackspam | SmallBizIT.US 26 packets to tcp(6863,6898,6902,6905,7049,7058,7072,7075,7079,7103,7105,7116,7123,7126,7143,7145,7157,7207,7221,7258,7267,7334,7336,7348,7392,7475) |
2020-06-21 07:17:19 |
| 122.51.178.89 | attackspambots | Invalid user david from 122.51.178.89 port 44900 |
2020-06-21 06:42:08 |
| 185.200.118.48 | attack | ET DROP Dshield Block Listed Source group 1 - port: 3128 proto: TCP cat: Misc Attack |
2020-06-21 06:59:01 |
| 37.49.226.208 | attackbots | Unauthorized connection attempt detected from IP address 37.49.226.208 to port 23 |
2020-06-21 07:11:58 |
| 134.209.95.102 | attackspambots | Honeypot attack, port: 4567, PTR: PTR record not found |
2020-06-21 07:03:03 |
| 185.156.73.57 | attackspambots | =Multiport scan 299 ports : 80(x7) 123(x13) 443(x11) 1000(x13) 1010(x12) 1111(x12) 1234(x12) 2000(x11) 2020(x11) 2222(x14) 2289(x11) 3000(x11) 3030(x13) 3111 3222 3333(x11) 3350(x14) 3351(x13) 3352(x12) 3353(x12) 3354(x11) 3355(x12) 3356(x11) 3357(x14) 3358(x12) 3359(x12) 3360(x11) 3361(x11) 3362(x12) 3363(x13) 3364(x12) 3365(x14) 3366(x11) 3367(x14) 3368(x11) 3369(x15) 3370(x13) 3371(x11) 3372(x13) 3373(x13) 3374(x13) 3375(x11) 3376(x10) 3377(x12) 3378(x15) 3379(x12) 3380(x12) 3381(x13) 3382(x12) 3383(x12) 3384(x14) 3385(x14) 3386(x12) 3387(x13) 3388(x13) 3390(x12) 3391(x13) 3392(x11) 3393(x12) 3394(x12) 3395(x12) 3396(x12) 3397(x11) 3398(x13) 3399(x13) 3444 3555(x2) 3666 3777 3888 3999(x2) 4000(x14) 4040(x12) 4111 4222(x3) 4333 4444(x11) 4489(x12) 4666(x2) 4777 4888(x2) 4999(x2) 5000(x12) 5050(x14) 5555(x11) 5589(x12) 6000(x11) 6060(x13) 6666(x12) 6689(x11) 7000(x10) 7070(x11) 7777(x13) 7789(x12) 8000(x11) 8080(x12) 8888(x12) 8889(x12) 9000(x13) 9001 9002 9003 9004 9005 9006 9007 9008.... |
2020-06-21 06:59:29 |
| 192.3.181.138 | attackspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-06-21 06:56:41 |
| 45.148.10.97 | attackspam | Honeypot hit: [2020-06-21 00:36:49 +0300] Connected from 45.148.10.97 to (HoneypotIP):993 |
2020-06-21 07:10:01 |