城市(city): unknown
省份(region): unknown
国家(country): United Arab Emirates (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.38.109.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.38.109.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:05:29 CST 2025
;; MSG SIZE rcvd: 104
45.109.38.5.in-addr.arpa domain name pointer gprs-emirnet3093.emirates.net.ae.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.109.38.5.in-addr.arpa name = gprs-emirnet3093.emirates.net.ae.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 154.83.15.91 | attackspambots | Invalid user rescue from 154.83.15.91 port 56297 |
2020-09-02 14:47:43 |
| 196.219.76.131 | attackspam | Unauthorized connection attempt from IP address 196.219.76.131 on Port 445(SMB) |
2020-09-02 14:55:28 |
| 190.198.14.206 | attack | Attempted connection to port 445. |
2020-09-02 14:45:57 |
| 85.209.0.252 | attackspam | Sep 2 07:12:40 v22019058497090703 sshd[32420]: Failed password for root from 85.209.0.252 port 15282 ssh2 ... |
2020-09-02 14:50:09 |
| 176.239.31.85 | attackbots | Unauthorized connection attempt from IP address 176.239.31.85 on Port 445(SMB) |
2020-09-02 14:46:11 |
| 185.59.44.23 | attackspam | php WP PHPmyadamin ABUSE blocked for 12h |
2020-09-02 14:52:11 |
| 2.88.36.138 | attack | Unauthorized connection attempt from IP address 2.88.36.138 on Port 445(SMB) |
2020-09-02 14:50:28 |
| 121.13.252.50 | attackbots | 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 2020-09-01 21:58:43 Possible DoS HGOD SynKiller Flooding 121.13.252.50 |
2020-09-02 15:05:01 |
| 198.23.137.133 | attack | Unauthorized connection attempt detected from IP address 198.23.137.133 to port 22 [T] |
2020-09-02 14:45:44 |
| 14.169.114.39 | attack | 14.169.114.39 - - [02/Sep/2020:01:21:04 -0400] "POST /xmlrpc.php HTTP/1.1" 404 208 "-" "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1467.0 Safari/537.36" 14.169.114.39 - - [02/Sep/2020:01:21:05 -0400] "POST /wordpress/xmlrpc.php HTTP/1.1" 404 218 "-" "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1467.0 Safari/537.36" 14.169.114.39 - - [02/Sep/2020:01:21:06 -0400] "POST /blog/xmlrpc.php HTTP/1.1" 404 213 "-" "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1467.0 Safari/537.36" ... |
2020-09-02 14:28:50 |
| 90.92.206.82 | attack | Invalid user praveen from 90.92.206.82 port 40212 |
2020-09-02 14:35:02 |
| 123.207.19.105 | attack | Invalid user dev from 123.207.19.105 port 60552 |
2020-09-02 15:02:06 |
| 189.124.227.17 | attack | 1598979343 - 09/01/2020 18:55:43 Host: 189.124.227.17/189.124.227.17 Port: 445 TCP Blocked |
2020-09-02 14:38:34 |
| 51.68.251.202 | attackspam | Sep 1 23:43:04 firewall sshd[23939]: Invalid user sysadmin from 51.68.251.202 Sep 1 23:43:06 firewall sshd[23939]: Failed password for invalid user sysadmin from 51.68.251.202 port 51018 ssh2 Sep 1 23:46:26 firewall sshd[23984]: Invalid user uftp from 51.68.251.202 ... |
2020-09-02 14:44:33 |
| 76.20.77.242 | attackbots | Attempted connection to port 15765. |
2020-09-02 14:42:13 |