城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.47.106.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.47.106.118. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 02:48:45 CST 2025
;; MSG SIZE rcvd: 106
118.106.47.50.in-addr.arpa domain name pointer 50-47-106-118.evrt.wa.ptr.ziplyfiber.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
118.106.47.50.in-addr.arpa name = 50-47-106-118.evrt.wa.ptr.ziplyfiber.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 184.105.247.238 | attack | 8443/tcp 548/tcp 389/tcp... [2020-03-05/05-05]125pkt,24pt.(tcp) |
2020-05-07 02:35:11 |
| 162.243.144.201 | attack | 514/tcp 83/tcp 1911/tcp... [2020-04-29/05-06]6pkt,6pt.(tcp) |
2020-05-07 02:42:46 |
| 162.243.142.64 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 5006 resulting in total of 58 scans from 162.243.0.0/16 block. |
2020-05-07 02:49:24 |
| 68.183.34.236 | attackspambots | Unauthorized connection attempt detected from IP address 68.183.34.236 to port 4758 [T] |
2020-05-07 03:08:52 |
| 89.248.168.217 | attackspambots | 05/06/2020-14:54:54.027228 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-05-07 02:58:57 |
| 162.243.144.15 | attackspam | 7001/tcp 2375/tcp 502/tcp... [2020-04-30/05-06]13pkt,11pt.(tcp) |
2020-05-07 02:44:56 |
| 64.227.35.138 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 24776 resulting in total of 14 scans from 64.227.0.0/17 block. |
2020-05-07 03:10:26 |
| 68.183.146.178 | attack | scans once in preceeding hours on the ports (in chronological order) 1309 resulting in total of 12 scans from 68.183.0.0/16 block. |
2020-05-07 03:06:12 |
| 80.82.69.130 | attack | 05/06/2020-12:53:14.669050 80.82.69.130 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-07 03:04:46 |
| 162.243.145.46 | attackspam | scans once in preceeding hours on the ports (in chronological order) 50070 resulting in total of 58 scans from 162.243.0.0/16 block. |
2020-05-07 02:41:05 |
| 106.54.117.228 | attack | scans once in preceeding hours on the ports (in chronological order) 6379 resulting in total of 2 scans from 106.52.0.0/15 - 106.54.0.0/16 block. |
2020-05-07 02:51:42 |
| 162.243.141.189 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 30001 resulting in total of 58 scans from 162.243.0.0/16 block. |
2020-05-07 02:50:39 |
| 94.102.50.137 | attackbotsspam | port |
2020-05-07 02:54:49 |
| 162.243.144.33 | attack | scans once in preceeding hours on the ports (in chronological order) 1521 resulting in total of 58 scans from 162.243.0.0/16 block. |
2020-05-07 02:44:29 |
| 167.172.148.56 | attackbots | 22802/tcp 16173/tcp 30051/tcp... [2020-04-12/05-06]68pkt,24pt.(tcp) |
2020-05-07 02:38:51 |