城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.39.93.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.39.93.53. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 01:38:54 CST 2025
;; MSG SIZE rcvd: 104
b'Host 53.93.39.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.39.93.53.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 221.204.224.8 | attack | Unauthorized connection attempt detected from IP address 221.204.224.8 to port 1433 [T] |
2020-01-16 01:53:34 |
| 125.72.101.60 | attack | Unauthorized connection attempt detected from IP address 125.72.101.60 to port 445 [T] |
2020-01-16 01:25:14 |
| 101.108.136.28 | attackbotsspam | Unauthorized connection attempt detected from IP address 101.108.136.28 to port 88 [T] |
2020-01-16 01:39:11 |
| 182.243.91.146 | attack | Bruteforce attack like: "GET /program/index.php HTTP/1.1" 404 78840 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0" /shopdb/index.php /phppma/index.php /phpmy/index.php /mysql/admin/index.php /mysql/dbadmin/index.php /mysql/sqlmanager/index.php ... |
2020-01-16 01:20:53 |
| 175.148.19.199 | attackbotsspam | Unauthorized connection attempt detected from IP address 175.148.19.199 to port 2323 [J] |
2020-01-16 01:23:37 |
| 222.186.30.209 | attackbots | Jan 15 14:50:32 firewall sshd[1186]: Failed password for root from 222.186.30.209 port 13545 ssh2 Jan 15 14:50:34 firewall sshd[1186]: Failed password for root from 222.186.30.209 port 13545 ssh2 Jan 15 14:50:37 firewall sshd[1186]: Failed password for root from 222.186.30.209 port 13545 ssh2 ... |
2020-01-16 01:51:44 |
| 39.108.65.243 | attack | Unauthorized connection attempt detected from IP address 39.108.65.243 to port 9200 [T] |
2020-01-16 01:47:36 |
| 80.91.125.134 | attackbots | TCP port 3389: Scan and connection |
2020-01-16 01:41:12 |
| 118.193.31.180 | attackbotsspam | Unauthorized connection attempt detected from IP address 118.193.31.180 to port 9100 [T] |
2020-01-16 01:30:16 |
| 114.67.113.92 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-16 01:34:31 |
| 91.151.192.183 | attackbots | Unauthorized connection attempt detected from IP address 91.151.192.183 to port 2323 [T] |
2020-01-16 01:40:46 |
| 212.64.101.169 | attackspam | Unauthorized connection attempt detected from IP address 212.64.101.169 to port 80 [T] |
2020-01-16 01:17:36 |
| 1.52.40.13 | attackbotsspam | Unauthorized connection attempt detected from IP address 1.52.40.13 to port 23 [J] |
2020-01-16 01:14:29 |
| 103.225.138.170 | attack | Unauthorized connection attempt detected from IP address 103.225.138.170 to port 445 [T] |
2020-01-16 01:38:16 |
| 182.254.217.198 | attack | Unauthorized connection attempt detected from IP address 182.254.217.198 to port 445 [T] |
2020-01-16 01:21:00 |