城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.239.220.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;75.239.220.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:40:03 CST 2025
;; MSG SIZE rcvd: 107
149.220.239.75.in-addr.arpa domain name pointer 149.sub-75-239-220.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.220.239.75.in-addr.arpa name = 149.sub-75-239-220.myvzw.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 212.175.140.10 | attackspam | Unauthorized connection attempt from IP address 212.175.140.10 on Port 445(SMB) |
2019-07-19 15:47:16 |
| 37.187.62.31 | attack | 2019-07-19T07:35:13.466598abusebot-2.cloudsearch.cf sshd\[9172\]: Invalid user info from 37.187.62.31 port 43092 |
2019-07-19 15:43:34 |
| 117.254.63.174 | attackbotsspam | Unauthorised access (Jul 19) SRC=117.254.63.174 LEN=52 PREC=0x20 TTL=109 ID=6055 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-19 15:55:33 |
| 218.72.38.3 | attackbots | FTP brute-force attack |
2019-07-19 15:34:42 |
| 37.34.186.150 | attack | firewall-block, port(s): 23/tcp |
2019-07-19 15:54:21 |
| 206.189.94.158 | attackspam | SSH bruteforce (Triggered fail2ban) |
2019-07-19 15:35:12 |
| 96.114.71.146 | attack | Automatic report - Banned IP Access |
2019-07-19 16:18:21 |
| 185.86.13.213 | attackspambots | Automatic report - Banned IP Access |
2019-07-19 15:59:44 |
| 203.95.193.192 | attackspam | RDP brute forcing (d) |
2019-07-19 15:58:50 |
| 54.152.164.61 | attackbotsspam | Trying to access NAS |
2019-07-19 15:31:32 |
| 203.87.133.90 | attackspambots | WordPress XMLRPC scan :: 203.87.133.90 0.124 BYPASS [19/Jul/2019:15:59:19 1000] [censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" |
2019-07-19 16:07:47 |
| 5.15.134.215 | attack | Automatic report - Port Scan Attack |
2019-07-19 15:46:21 |
| 54.37.232.108 | attackbotsspam | Jul 19 08:01:28 srv206 sshd[21052]: Invalid user alejandra from 54.37.232.108 ... |
2019-07-19 15:26:46 |
| 142.44.160.173 | attackspambots | Jul 19 14:09:23 webhost01 sshd[23309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173 Jul 19 14:09:25 webhost01 sshd[23309]: Failed password for invalid user dummy from 142.44.160.173 port 60226 ssh2 ... |
2019-07-19 15:38:42 |
| 59.99.100.224 | attack | TCP port 445 (SMB) attempt blocked by firewall. [2019-07-19 08:00:30] |
2019-07-19 15:30:58 |