城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.138.255.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;29.138.255.209. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:38:40 CST 2025
;; MSG SIZE rcvd: 107
Host 209.255.138.29.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 209.255.138.29.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 197.215.155.18 | attackspambots | 2019-11-24 11:48:10 1iYpR1-0006Pm-Jc SMTP connection from \(\[197.215.155.18\]\) \[197.215.155.18\]:11392 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-11-24 11:48:50 1iYpRh-0006Qa-1m SMTP connection from \(\[197.215.155.18\]\) \[197.215.155.18\]:11630 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-11-24 11:49:19 1iYpSA-0006RJ-UL SMTP connection from \(\[197.215.155.18\]\) \[197.215.155.18\]:11776 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 04:53:56 |
| 51.211.172.245 | attackbotsspam | Unauthorized connection attempt from IP address 51.211.172.245 on Port 445(SMB) |
2020-01-30 05:18:30 |
| 203.172.66.216 | attack | Unauthorized connection attempt detected from IP address 203.172.66.216 to port 2220 [J] |
2020-01-30 04:37:10 |
| 115.186.177.142 | attack | Unauthorized connection attempt from IP address 115.186.177.142 on Port 445(SMB) |
2020-01-30 04:51:42 |
| 197.226.212.162 | attack | 2019-03-15 14:07:47 H=\(\[197.226.212.162\]\) \[197.226.212.162\]:16876 I=\[193.107.88.166\]:25 F=\ |
2020-01-30 04:38:15 |
| 157.230.243.133 | attack | Invalid user kunsh from 157.230.243.133 port 34072 |
2020-01-30 04:49:19 |
| 103.10.87.54 | attack | Unauthorized connection attempt detected from IP address 103.10.87.54 to port 1433 [J] |
2020-01-30 05:10:03 |
| 197.184.33.4 | attackbots | 2019-07-06 07:03:43 1hjcrN-0004yO-Jb SMTP connection from \(\[197.184.33.4\]\) \[197.184.33.4\]:46999 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 07:03:57 1hjcrZ-0004yb-NM SMTP connection from \(\[197.184.33.4\]\) \[197.184.33.4\]:47054 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 07:04:06 1hjcri-0004yn-UW SMTP connection from \(\[197.184.33.4\]\) \[197.184.33.4\]:47109 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 05:16:08 |
| 41.33.9.3 | attackspam | 1580304647 - 01/29/2020 14:30:47 Host: 41.33.9.3/41.33.9.3 Port: 445 TCP Blocked |
2020-01-30 05:17:51 |
| 222.186.173.215 | attack | $f2bV_matches |
2020-01-30 05:12:51 |
| 200.90.12.227 | attackbots | Unauthorized connection attempt from IP address 200.90.12.227 on Port 445(SMB) |
2020-01-30 05:05:57 |
| 5.196.116.202 | attackspam | Jan 27 00:33:10 main sshd[13794]: Failed password for invalid user test from 5.196.116.202 port 43226 ssh2 Jan 27 01:37:07 main sshd[17505]: Failed password for invalid user test from 5.196.116.202 port 37040 ssh2 Jan 27 22:05:39 main sshd[31671]: Failed password for invalid user god from 5.196.116.202 port 37662 ssh2 Jan 28 00:20:54 main sshd[4356]: Failed password for invalid user ark from 5.196.116.202 port 39126 ssh2 Jan 28 23:41:26 main sshd[24466]: Failed password for invalid user ts from 5.196.116.202 port 39192 ssh2 Jan 29 00:05:49 main sshd[25229]: Failed password for invalid user ovh from 5.196.116.202 port 35306 ssh2 Jan 29 01:21:55 main sshd[29606]: Failed password for invalid user db2fenc2 from 5.196.116.202 port 40486 ssh2 Jan 29 11:08:49 main sshd[15113]: Failed password for invalid user ashok from 5.196.116.202 port 59920 ssh2 Jan 29 23:13:17 main sshd[31437]: Failed password for invalid user deploy from 5.196.116.202 port 49096 ssh2 |
2020-01-30 04:47:18 |
| 185.12.177.229 | attack | Fail2Ban Ban Triggered |
2020-01-30 05:02:32 |
| 197.185.116.160 | attackspam | 2019-03-15 12:38:56 1h4lAu-0008NI-2l SMTP connection from \(\[197.185.116.160\]\) \[197.185.116.160\]:19360 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-15 12:39:30 1h4lBR-0008PU-Hx SMTP connection from \(\[197.185.116.160\]\) \[197.185.116.160\]:19361 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-15 12:39:51 1h4lBm-0008Pk-Ki SMTP connection from \(\[197.185.116.160\]\) \[197.185.116.160\]:19362 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 05:13:45 |
| 197.221.251.27 | attackbots | 2019-03-11 18:57:49 H=\(16.27.telone.co.zw\) \[197.221.251.27\]:18075 I=\[193.107.88.166\]:25 F=\ |
2020-01-30 04:46:05 |