城市(city): Kronach
省份(region): Bavaria
国家(country): Germany
运营商(isp): Telekom
主机名(hostname): unknown
机构(organization): Deutsche Telekom AG
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.230.201.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17202
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;93.230.201.148. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 22 20:57:19 +08 2019
;; MSG SIZE rcvd: 118
148.201.230.93.in-addr.arpa domain name pointer p5DE6C994.dip0.t-ipconnect.de.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
148.201.230.93.in-addr.arpa name = p5DE6C994.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 223.149.107.95 | attackbotsspam | unauthorized connection attempt |
2020-02-16 16:13:38 |
| 185.158.8.196 | attackspambots | unauthorized connection attempt |
2020-02-16 16:15:16 |
| 49.159.201.164 | attackbotsspam | unauthorized connection attempt |
2020-02-16 16:56:04 |
| 41.230.12.180 | attack | unauthorized connection attempt |
2020-02-16 16:20:00 |
| 125.20.36.130 | attack | unauthorized connection attempt |
2020-02-16 16:37:24 |
| 89.47.45.85 | attackspambots | unauthorized connection attempt |
2020-02-16 16:21:10 |
| 138.219.15.14 | attack | Port scan: Attack repeated for 24 hours |
2020-02-16 16:20:44 |
| 211.62.185.15 | attackspambots | unauthorized connection attempt |
2020-02-16 16:31:21 |
| 220.132.214.196 | attack | unauthorized connection attempt |
2020-02-16 16:50:43 |
| 2.249.90.227 | attack | unauthorized connection attempt |
2020-02-16 16:47:45 |
| 116.100.193.255 | attackspambots | unauthorized connection attempt |
2020-02-16 16:53:54 |
| 178.124.188.42 | attack | Port 4125 scan denied |
2020-02-16 16:10:47 |
| 49.235.91.59 | attack | Feb 16 09:08:36 dedicated sshd[19133]: Invalid user www from 49.235.91.59 port 40890 |
2020-02-16 16:29:41 |
| 103.66.79.211 | attackbotsspam | unauthorized connection attempt |
2020-02-16 16:54:48 |
| 118.211.146.145 | attackbots | unauthorized connection attempt |
2020-02-16 16:32:47 |