城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.88.29.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.88.29.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:46:32 CST 2025
;; MSG SIZE rcvd: 104
Host 92.29.88.49.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 92.29.88.49.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.82.64.110 | attackbots | Multiport scan : 4 ports scanned 53 3702 9527 30120 |
2020-05-03 07:23:58 |
| 87.251.74.243 | attackbots | Multiport scan : 29 ports scanned 1054 1074 1076 1717 1919 1981 2626 3170 3371 3420 4013 5090 5522 6010 6611 8060 8520 8580 9085 10495 10625 10950 25025 25152 31313 40804 47047 51051 64064 |
2020-05-03 07:18:05 |
| 103.119.144.218 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 32993 proto: UDP cat: Misc Attack |
2020-05-03 07:12:25 |
| 177.137.96.14 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 07:09:59 |
| 37.49.226.4 | attack | ET DROP Dshield Block Listed Source group 1 - port: 81 proto: TCP cat: Misc Attack |
2020-05-03 07:32:58 |
| 80.82.77.139 | attack | 05/02/2020-17:40:53.918420 80.82.77.139 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82 |
2020-05-03 07:21:36 |
| 89.248.172.85 | attack | 05/02/2020-18:39:55.165399 89.248.172.85 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-03 07:16:03 |
| 45.227.255.204 | attack | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak |
2020-05-03 07:29:32 |
| 79.124.62.66 | attack | 05/02/2020-18:50:01.785660 79.124.62.66 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-03 07:24:48 |
| 104.237.154.148 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 100 - port: 2083 proto: TCP cat: Misc Attack |
2020-05-03 07:11:46 |
| 51.79.55.107 | attack | May 3 00:22:57 mail sshd\[850\]: Invalid user ashish from 51.79.55.107 May 3 00:22:57 mail sshd\[850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.55.107 May 3 00:23:00 mail sshd\[850\]: Failed password for invalid user ashish from 51.79.55.107 port 36342 ssh2 ... |
2020-05-03 07:40:19 |
| 89.248.160.178 | attackbots | Triggered: repeated knocking on closed ports. |
2020-05-03 07:17:02 |
| 178.62.113.55 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 23980 proto: TCP cat: Misc Attack |
2020-05-03 07:09:28 |
| 185.175.93.27 | attackspambots | 05/02/2020-17:07:08.244439 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-03 07:07:02 |
| 80.82.78.100 | attackbotsspam | May 3 01:17:38 debian-2gb-nbg1-2 kernel: \[10720364.090874\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.78.100 DST=195.201.40.59 LEN=57 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=34544 DPT=1060 LEN=37 |
2020-05-03 07:20:34 |