城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.79.83.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.79.83.182. IN A
;; AUTHORITY SECTION:
. 544 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:18:59 CST 2022
;; MSG SIZE rcvd: 105
182.83.79.41.in-addr.arpa domain name pointer 182-83-79-41.bitcointernet.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
182.83.79.41.in-addr.arpa name = 182-83-79-41.bitcointernet.co.za.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
46.0.118.192 | bots | 俄罗斯爬虫 |
2019-06-04 06:49:17 |
104.237.226.44 | spamattack | 104.237.226.44 - - [13/May/2019:10:14:27 +0800] "POST /check-ip/173.213.132.149 HTTP/1.1" 400 142 "-" "Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol 4.0.30319.17929)" 104.237.226.44 - - [13/May/2019:10:14:30 +0800] "POST / HTTP/1.1" 400 142 "-" "Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol 4.0.30319.17929)" |
2019-05-13 10:19:35 |
205.185.114.87 | attack | MultiHost/MultiPort Probe, Scan, Hack |
2019-06-12 10:46:30 |
195.154.183.53 | attack | The offending parameter was "--30e4a130ae8b343fec4c347041c030a5 Content-Disposition:_form-data;_name" with a value of ""action" upload --30e4a130ae8b343fec4c347041c030a5 Content-Disposition: form-data; name="upload-dir" ../ --30e4a130ae8b343fec4c347041c030a5 Content-Disposition: form-data; name="upload-overwrite" 0 --30e4a130ae8b343fec4c347041c030a5 Content-Disposition: form-data; name="Filedata"; filename="pwn.gif" --30e4a130ae8b343fec4c347041c030a5-- ". |
2019-06-09 04:58:28 |
104.152.52.70 | botsattack | 104.152.52.70 - - [16/May/2019:03:44:31 +0800] "l\\x00\\x0B\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00" 400 182 "-" "-" 104.152.52.70 - - [16/May/2019:03:44:31 +0800] "GET /nice%20ports%2C/Tri%6Eity.txt%2ebak HTTP/1.0" 301 194 "-" "-" 104.152.52.70 - - [16/May/2019:03:44:37 +0800] "" 400 0 "-" "-" |
2019-05-16 06:06:42 |
172.58.221.194 | attack | Google account has been hacked into. Recovery ip address comes up in Providence R.I.. Can you help me access my google account |
2019-06-12 01:31:33 |
88.249.222.200 | normal | mail adresini ogreneceğim |
2019-06-01 12:13:47 |
218.30.103.183 | bots | 搜狗爬虫 |
2019-05-13 11:41:17 |
54.39.24.42 | spam | 垃圾IP推广评论 |
2019-05-13 09:29:54 |
154.73.11.16 | botsattack | 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/66.102.7.131 HTTP/1.1" 200 10208 "https://ipinfo.asytech.cn/" "Scope (Mars+)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/54.221.53.134 HTTP/1.1" 200 10843 "https://ipinfo.asytech.cn/" "AmigaVoyager/3.4.4 (MorphOS/PPC native)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/52.4.236.226 HTTP/1.1" 200 10342 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows; U; Win98; en-US; rv:0.9.2) Gecko/20010726 Netscape6/6.1" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/47.76.186.208 HTTP/1.1" 200 10118 "https://ipinfo.asytech.cn/" "UPG1 UP/4.0 (compatible; Blazer 1.0)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/98.152.56.135 HTTP/1.1" 200 9694 "https://ipinfo.asytech.cn/" "Lynx/2.6 libwww-FM/2.14" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/38.164.28.153 HTTP/1.1" 200 10459 "https://ipinfo.asytech.cn/" "SBL-BOT (http://sbl.net)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/38.143.68.212 HTTP/1.1" 200 10732 "https://ipinfo.asytech.cn/" "West Wind Internet Protocols 4.xx" |
2019-05-20 09:15:30 |
217.26.130.173 | normal | normal ip |
2019-05-25 07:40:37 |
222.168.130.186 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2019-06-12 10:45:39 |
84.38.132.58 | bots | bing/yahoo爬虫 84.38.132.58 - - [09/May/2019:12:24:01 +0800] "GET /check-ip/52.91.66.205 HTTP/1.1" 200 10869 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" 84.38.132.58 - - [09/May/2019:12:24:07 +0800] "GET /check-ip/170.79.91.46 HTTP/1.1" 200 11582 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" 84.38.132.58 - - [09/May/2019:12:24:12 +0800] "GET /check-ip/13.68.231.137 HTTP/1.1" 200 10854 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" 84.38.132.58 - - [09/May/2019:12:24:16 +0800] "GET /check-ip/104.194.24.222 HTTP/1.1" 200 10862 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" |
2019-05-09 12:24:54 |
190.135.88.61 | attack | 445/tcp [2019-06-12]1pkt |
2019-06-12 10:45:04 |
198.20.99.130 | attack | 12.06.2019 02:41:13 Connection to port 623 blocked by firewall |
2019-06-12 10:45:58 |