城市(city): Melton Mowbray
省份(region): England
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.220.26.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;90.220.26.242. IN A
;; AUTHORITY SECTION:
. 584 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010301 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 12:20:16 CST 2022
;; MSG SIZE rcvd: 106
242.26.220.90.in-addr.arpa domain name pointer 5adc1af2.bb.sky.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.26.220.90.in-addr.arpa name = 5adc1af2.bb.sky.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
157.245.235.139 | attack | Apache Struts Content-Type Remote Code Execution Vulnerability CVE-2017-5638, PTR: PTR record not found |
2019-11-06 21:26:41 |
118.96.165.170 | attackbotsspam | Port 1433 Scan |
2019-11-06 21:16:25 |
37.187.157.170 | attack | Automatic report - XMLRPC Attack |
2019-11-06 21:07:06 |
108.169.181.185 | attackbots | 06.11.2019 07:22:06 - Wordpress fail Detected by ELinOX-ALM |
2019-11-06 21:05:41 |
94.191.2.228 | attackspambots | Automatic report - Banned IP Access |
2019-11-06 21:15:08 |
159.65.127.58 | attackspambots | GET /wp-login.php |
2019-11-06 21:18:28 |
121.142.111.106 | attackspam | $f2bV_matches |
2019-11-06 20:53:01 |
117.50.12.10 | attackbots | Nov 6 10:04:31 marvibiene sshd[48998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.12.10 user=root Nov 6 10:04:33 marvibiene sshd[48998]: Failed password for root from 117.50.12.10 port 33648 ssh2 Nov 6 10:09:31 marvibiene sshd[49093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.12.10 user=root Nov 6 10:09:33 marvibiene sshd[49093]: Failed password for root from 117.50.12.10 port 42018 ssh2 ... |
2019-11-06 20:54:11 |
178.128.7.249 | attackbotsspam | Repeated brute force against a port |
2019-11-06 21:12:54 |
222.186.175.150 | attackspam | Nov 6 14:17:53 mail sshd[9690]: Failed password for root from 222.186.175.150 port 5622 ssh2 Nov 6 14:17:58 mail sshd[9690]: Failed password for root from 222.186.175.150 port 5622 ssh2 Nov 6 14:18:02 mail sshd[9690]: Failed password for root from 222.186.175.150 port 5622 ssh2 Nov 6 14:18:08 mail sshd[9690]: Failed password for root from 222.186.175.150 port 5622 ssh2 |
2019-11-06 21:28:59 |
180.124.241.162 | attackspam | Nov 6 07:14:19 mxgate1 postfix/postscreen[20039]: CONNECT from [180.124.241.162]:7880 to [176.31.12.44]:25 Nov 6 07:14:19 mxgate1 postfix/dnsblog[20050]: addr 180.124.241.162 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 6 07:14:19 mxgate1 postfix/dnsblog[20041]: addr 180.124.241.162 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 6 07:14:19 mxgate1 postfix/dnsblog[20041]: addr 180.124.241.162 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 6 07:14:19 mxgate1 postfix/dnsblog[20041]: addr 180.124.241.162 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 6 07:14:19 mxgate1 postfix/dnsblog[20043]: addr 180.124.241.162 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 6 07:14:25 mxgate1 postfix/postscreen[20039]: DNSBL rank 4 for [180.124.241.162]:7880 Nov x@x Nov 6 07:14:27 mxgate1 postfix/postscreen[20039]: DISCONNECT [180.124.241.162]:7880 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=180.124.241.162 |
2019-11-06 20:59:35 |
159.65.239.48 | attackbots | $f2bV_matches |
2019-11-06 20:50:37 |
75.127.147.2 | attack | ... |
2019-11-06 20:55:08 |
185.153.196.28 | attack | Nov 6 12:47:46 mc1 kernel: \[4327165.732855\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.153.196.28 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=40613 PROTO=TCP SPT=52736 DPT=1122 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 6 12:52:39 mc1 kernel: \[4327458.419033\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.153.196.28 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=19064 PROTO=TCP SPT=52736 DPT=27 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 6 12:56:23 mc1 kernel: \[4327682.492612\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.153.196.28 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=48160 PROTO=TCP SPT=52736 DPT=1255 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-06 21:11:21 |
95.158.227.172 | attackspambots | Chat Spam |
2019-11-06 21:21:17 |