城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.34.131.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.34.131.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 13:30:15 CST 2025
;; MSG SIZE rcvd: 106
193.131.34.52.in-addr.arpa domain name pointer ec2-52-34-131-193.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
193.131.34.52.in-addr.arpa name = ec2-52-34-131-193.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 2.182.39.186 | attackspambots | 2019-03-11 12:51:57 1h3JTG-0007Um-IB SMTP connection from \(\[2.182.39.186\]\) \[2.182.39.186\]:27324 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 12:52:31 1h3JTp-0007WK-5m SMTP connection from \(\[2.182.39.186\]\) \[2.182.39.186\]:27430 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 12:53:06 1h3JUI-0007Xi-M1 SMTP connection from \(\[2.182.39.186\]\) \[2.182.39.186\]:27512 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:00:56 |
| 2.144.246.215 | attackspam | 2019-03-11 09:43:59 H=\(\[2.144.246.215\]\) \[2.144.246.215\]:38960 I=\[193.107.88.166\]:25 F=\ |
2020-01-30 02:04:14 |
| 122.51.151.161 | attackspambots | 445/tcp [2020-01-29]1pkt |
2020-01-30 01:57:24 |
| 67.175.126.149 | attackbotsspam | 37215/tcp [2020-01-29]1pkt |
2020-01-30 02:34:10 |
| 2.132.253.246 | attack | 2019-09-23 19:24:24 1iCS4V-0001fh-0O SMTP connection from \(\[2.132.253.246\]\) \[2.132.253.246\]:11818 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-23 19:24:36 1iCS4h-0001fs-92 SMTP connection from \(\[2.132.253.246\]\) \[2.132.253.246\]:11924 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-23 19:24:46 1iCS4r-0001g7-EL SMTP connection from \(\[2.132.253.246\]\) \[2.132.253.246\]:11999 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:13:54 |
| 40.77.188.108 | attack | Calling not existent HTTP content (400 or 404). |
2020-01-30 02:17:24 |
| 187.163.191.26 | attackbots | 23/tcp 23/tcp 23/tcp... [2020-01-29]4pkt,1pt.(tcp) |
2020-01-30 01:58:31 |
| 2.132.108.4 | attackspam | 2019-03-11 12:55:33 1h3JWm-0007iI-4g SMTP connection from \(2.132.108.4.megaline.telecom.kz\) \[2.132.108.4\]:31012 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 12:55:53 1h3JX5-0007il-VI SMTP connection from \(2.132.108.4.megaline.telecom.kz\) \[2.132.108.4\]:31180 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 12:56:07 1h3JXK-0007jA-Rp SMTP connection from \(2.132.108.4.megaline.telecom.kz\) \[2.132.108.4\]:31296 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:19:53 |
| 199.189.27.98 | attackspambots | 2019-03-13 21:27:01 1h4ASq-0000i5-Us SMTP connection from dislike.hasanhost.com \(dislike.aspalkepton.icu\) \[199.189.27.98\]:42178 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-13 21:27:35 1h4ATP-0000jD-J8 SMTP connection from dislike.hasanhost.com \(dislike.aspalkepton.icu\) \[199.189.27.98\]:36658 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-03-13 21:27:52 1h4ATg-0000jS-7L SMTP connection from dislike.hasanhost.com \(dislike.aspalkepton.icu\) \[199.189.27.98\]:55108 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-17 09:48:49 H=dislike.hasanhost.com \(dislike.sonyfirmwares.icu\) \[199.189.27.98\]:53360 I=\[193.107.88.166\]:25 sender verify fail for \ |
2020-01-30 02:30:00 |
| 103.29.185.143 | attack | 8080/tcp [2020-01-29]1pkt |
2020-01-30 02:02:06 |
| 2.132.82.82 | attackbotsspam | 2019-03-01 15:02:04 H=\(2.132.82.82.megaline.telecom.kz\) \[2.132.82.82\]:3601 I=\[193.107.88.166\]:25 F=\ |
2020-01-30 02:12:55 |
| 114.38.36.45 | attack | 23/tcp [2020-01-29]1pkt |
2020-01-30 01:56:26 |
| 199.189.27.120 | attackspambots | 2019-03-01 06:41:24 H=circa.hasanhost.com \(circa.relaxorder.icu\) \[199.189.27.120\]:52021 I=\[193.107.88.166\]:25 sender verify fail for \ |
2020-01-30 02:38:02 |
| 104.140.188.54 | attack | Unauthorized connection attempt detected from IP address 104.140.188.54 to port 5060 [J] |
2020-01-30 01:58:51 |
| 85.97.146.57 | attackspambots | Honeypot attack, port: 5555, PTR: 85.97.146.57.dynamic.ttnet.com.tr. |
2020-01-30 02:10:43 |