城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.48.21.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.48.21.51. IN A
;; AUTHORITY SECTION:
. 561 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 15:49:01 CST 2022
;; MSG SIZE rcvd: 104
51.21.48.50.in-addr.arpa domain name pointer 50-48-21-51.drr05.mdtw.ny.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
51.21.48.50.in-addr.arpa name = 50-48-21-51.drr05.mdtw.ny.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 23.129.64.233 | attackbotsspam | Unauthorized IMAP connection attempt |
2020-01-11 02:27:08 |
| 27.72.77.25 | attackspambots | Unauthorized connection attempt detected from IP address 27.72.77.25 to port 445 |
2020-01-11 02:29:41 |
| 92.118.37.86 | attack | Jan 10 18:35:29 h2177944 kernel: \[1876222.843945\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.86 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=21480 PROTO=TCP SPT=52979 DPT=4287 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 10 18:35:29 h2177944 kernel: \[1876222.843959\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.86 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=21480 PROTO=TCP SPT=52979 DPT=4287 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 10 18:54:46 h2177944 kernel: \[1877379.659846\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.86 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54788 PROTO=TCP SPT=52979 DPT=4799 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 10 18:54:46 h2177944 kernel: \[1877379.659861\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.86 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54788 PROTO=TCP SPT=52979 DPT=4799 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 10 18:58:40 h2177944 kernel: \[1877613.703461\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.86 DST=85.214.117.9 LEN= |
2020-01-11 02:05:51 |
| 218.164.2.31 | attack | SASL PLAIN auth failed: ruser=... |
2020-01-11 02:15:02 |
| 182.75.88.86 | attack | Jan 10 13:55:56 grey postfix/smtpd\[30252\]: NOQUEUE: reject: RCPT from unknown\[182.75.88.86\]: 554 5.7.1 Service unavailable\; Client host \[182.75.88.86\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[182.75.88.86\]\; from=\ |
2020-01-11 02:00:33 |
| 190.98.242.101 | attackbotsspam | unauthorized connection attempt |
2020-01-11 01:59:39 |
| 42.159.132.238 | attack | Jan 10 15:05:58 amit sshd\[29925\]: Invalid user qum from 42.159.132.238 Jan 10 15:05:58 amit sshd\[29925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.132.238 Jan 10 15:06:00 amit sshd\[29925\]: Failed password for invalid user qum from 42.159.132.238 port 40884 ssh2 ... |
2020-01-11 01:56:46 |
| 195.70.38.40 | attackspambots | Jan 10 13:54:27 ks10 sshd[1122697]: Failed password for root from 195.70.38.40 port 59762 ssh2 ... |
2020-01-11 02:07:56 |
| 45.117.83.36 | attackspambots | Brute-force attempt banned |
2020-01-11 02:22:13 |
| 138.255.106.18 | attackbotsspam | Jan 10 13:55:17 grey postfix/smtpd\[13761\]: NOQUEUE: reject: RCPT from unknown\[138.255.106.18\]: 554 5.7.1 Service unavailable\; Client host \[138.255.106.18\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[138.255.106.18\]\; from=\ |
2020-01-11 02:29:59 |
| 104.199.196.16 | attackbots | [09/Jan/2020:02:54:39 -0500] "GET / HTTP/1.1" "Mozilla/5.0 zgrab/0.x" |
2020-01-11 01:47:39 |
| 106.255.155.165 | attack | Automatic report - SSH Brute-Force Attack |
2020-01-11 02:09:23 |
| 192.162.70.66 | attack | 1578663015 - 01/10/2020 14:30:15 Host: 192.162.70.66/192.162.70.66 Port: 22 TCP Blocked |
2020-01-11 01:59:12 |
| 154.117.123.90 | attackspambots | B: Magento admin pass test (wrong country) |
2020-01-11 01:49:14 |
| 95.181.176.213 | attackspam | B: Magento admin pass test (wrong country) |
2020-01-11 02:25:48 |