城市(city): unknown
省份(region): unknown
国家(country): Korea (the Republic of)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.29.238.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.29.238.110. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 01:28:57 CST 2025
;; MSG SIZE rcvd: 106
Host 110.238.29.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 110.238.29.42.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 179.177.12.193 | attack | Port Scan: TCP/23 |
2019-08-24 15:45:50 |
| 197.225.100.89 | attackspambots | Port Scan: TCP/23 |
2019-08-24 15:44:32 |
| 61.168.142.138 | attackspambots | Port Scan: TCP/23 |
2019-08-24 15:37:43 |
| 5.63.151.124 | attack | Port scan attempt detected by AWS-CCS, CTS, India |
2019-08-24 15:17:35 |
| 78.139.91.76 | attackspam | proto=tcp . spt=56765 . dpt=25 . (listed on Blocklist de Aug 23) (139) |
2019-08-24 16:06:30 |
| 51.253.15.27 | attackspambots | This IP address was blacklisted for the following reason: /nl/jobs/"%20and%20"x"%3D"x @ 2019-08-09T15:32:34+02:00. |
2019-08-24 15:58:46 |
| 84.127.90.65 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2019-08-24 16:03:35 |
| 54.38.178.106 | attackspambots | Port Scan: TCP/10000 |
2019-08-24 15:57:40 |
| 18.206.93.59 | attack | Port Scan: TCP/80 |
2019-08-24 15:59:42 |
| 177.69.5.146 | attackbotsspam | Port Scan: UDP/137 |
2019-08-24 15:24:29 |
| 213.32.252.126 | attack | Port Scan: TCP/8080 |
2019-08-24 15:42:43 |
| 203.128.242.166 | attackbotsspam | Aug 23 21:35:53 wbs sshd\[14394\]: Invalid user sign from 203.128.242.166 Aug 23 21:35:53 wbs sshd\[14394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166 Aug 23 21:35:55 wbs sshd\[14394\]: Failed password for invalid user sign from 203.128.242.166 port 53444 ssh2 Aug 23 21:40:56 wbs sshd\[15009\]: Invalid user test1 from 203.128.242.166 Aug 23 21:40:56 wbs sshd\[15009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166 |
2019-08-24 16:06:05 |
| 146.185.25.164 | attackbots | Port Scan: TCP/4000 |
2019-08-24 15:26:46 |
| 84.214.64.27 | attack | Port Scan: TCP/60001 |
2019-08-24 15:51:44 |
| 82.51.76.108 | attackspambots | Port Scan: TCP/23 |
2019-08-24 15:52:26 |