城市(city): Cary
省份(region): North Carolina
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.220.155.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;69.220.155.63. IN A
;; AUTHORITY SECTION:
. 133 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020100301 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 04 09:46:14 CST 2020
;; MSG SIZE rcvd: 117
63.155.220.69.in-addr.arpa domain name pointer 69-220-155-63.lightspeed.rlghnc.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
63.155.220.69.in-addr.arpa name = 69-220-155-63.lightspeed.rlghnc.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.179.88.89 | attackbots | [portscan] tcp/1433 [MsSQL] [scan/connect: 2 time(s)] *(RWIN=8192)(11190859) |
2019-11-19 19:47:17 |
| 182.120.53.9 | attack | [portscan] tcp/23 [TELNET] *(RWIN=47155)(11190859) |
2019-11-19 20:09:34 |
| 182.113.245.91 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=50551)(11190859) |
2019-11-19 19:53:20 |
| 67.198.131.179 | attack | [portscan] tcp/1433 [MsSQL] in sorbs:'listed [spam]' *(RWIN=1024)(11190859) |
2019-11-19 20:15:20 |
| 122.10.89.163 | attackbotsspam | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(11190859) |
2019-11-19 20:11:34 |
| 80.82.78.33 | attack | 80.82.78.33 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 99, 223 |
2019-11-19 20:06:04 |
| 138.99.69.98 | attackspambots | [portscan] tcp/23 [TELNET] [scan/connect: 2 time(s)] *(RWIN=15166,63758)(11190859) |
2019-11-19 19:54:28 |
| 104.140.188.14 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-19 19:46:05 |
| 89.237.192.129 | attackspambots | [portscan] tcp/1433 [MsSQL] in sorbs:'listed [spam]' in Unsubscore:'listed' *(RWIN=8192)(11190859) |
2019-11-19 19:46:58 |
| 113.53.41.162 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=59189)(11190859) |
2019-11-19 20:22:03 |
| 12.27.234.142 | attack | Telnet Server BruteForce Attack |
2019-11-19 20:07:46 |
| 104.206.128.38 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-19 19:45:52 |
| 92.118.37.91 | attack | Unauthorized SSH login attempts |
2019-11-19 20:12:47 |
| 37.49.230.18 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 22 - port: 80 proto: TCP cat: Misc Attack |
2019-11-19 19:57:33 |
| 178.62.29.151 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=65535)(11190859) |
2019-11-19 20:10:34 |