城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 96.42.247.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34816
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;96.42.247.13. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:11:12 CST 2022
;; MSG SIZE rcvd: 105
13.247.42.96.in-addr.arpa domain name pointer 096-042-247-013.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.247.42.96.in-addr.arpa name = 096-042-247-013.res.spectrum.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
140.117.90.13 | attack | port 3389 attack, brute-force |
2020-12-21 10:24:04 |
185.63.153.200 | proxy | Bokep |
2020-12-22 06:28:07 |
63.80.89.179 | spamattack | PHISHING ATTACK : Heidi at Biden Small Business Assistance -isabelle@vulnessione.top : "Re: Supposed to follow up with you? $24.99/mo credit card processing (flat-fee)": from [63.80.89.179] (port=38548 helo=mail.vulnessione.top) : Sun, 27 Dec 2020 16:44:18 +1100 |
2020-12-27 18:09:52 |
111.90.150.204 | attack | good looking |
2020-12-25 17:30:51 |
185.63.153.200 | proxy | Bokep |
2020-12-22 06:27:55 |
113.185.73.207 | attack | Hacker from Vietnam that tried to steal social media accounts. Report this IP whenever you see it |
2020-12-28 17:19:04 |
168.194.86.179 | attack | denied winbox/dude connect from 168.194.86.179 |
2020-12-30 15:17:28 |
69.171.250.15 | spamattack | [Querying whois.arin.net] [whois.arin.net] # # ARIN WHOIS data and services are subject to the Terms of Use # available at: https://www.arin.net/resources/registry/whois/tou/ # # If you see inaccuracies in the results, please report at # https://www.arin.net/resources/registry/whois/inaccuracy_reporting/ # # Copyright 1997-2020, American Registry for Internet Numbers, Ltd. # NetRange: 69.171.224.0 - 69.171.255.255 CIDR: 69.171.224.0/19 NetName: TFBNET3 NetHandle: NET-69-171-224-0-1 Parent: NET69 (NET-69-0-0-0-0) NetType: Direct Assignment OriginAS: AS32934 Organization: Facebook, Inc. (THEFA-3) RegDate: 2010-08-05 Updated: 2012-02-24 Ref: https://rdap.arin.net/registry/ip/69.171.224.0 OrgName: Facebook, Inc. OrgId: THEFA-3 Address: 1601 Willow Rd. City: Menlo Park StateProv: CA PostalCode: 94025 Country: US RegDate: 2004-08-11 Updated: 2012-04-17 Ref: https://rdap.arin.net/registry/entity/THEFA-3 OrgTechHandle: OPERA82-ARIN OrgTechName: Operations OrgTechPhone: +1-650-543-4800 OrgTechEmail: domain@facebook.com OrgTechRef: https://rdap.arin.net/registry/entity/OPERA82-ARIN OrgAbuseHandle: OPERA82-ARIN OrgAbuseName: Operations OrgAbusePhone: +1-650-543-4800 OrgAbuseEmail: domain@facebook.com OrgAbuseRef: https://rdap.arin.net/registry/entity/OPERA82-ARIN # # ARIN WHOIS data and services are subject to the Terms of Use # available at: https://www.arin.net/resources/registry/whois/tou/ # # If you see inaccuracies in the results, please report at # https://www.arin.net/resources/registry/ |
2020-12-21 10:19:46 |
187.137.59.98 | spambotsattackproxynormal | Por q me sale esta ip i en el router sale otra ip? |
2020-12-17 09:15:42 |
103.218.27.171 | normal | Normal ip |
2020-12-15 16:54:13 |
208.91.197.132 | attack | Multiple malware samples associated with this IP. |
2020-12-19 08:42:42 |
222.184.254.170 | spamattack | PHISHING ATTACK - Bitcoin Cora |
2020-12-27 11:36:44 |
185.63.253.200 | spambotsattackproxynormal | Bokep taxsi |
2020-12-28 07:27:18 |
162.229.239.199 | spamattack | 11 Dec 2020 PHISHING ATTACK :"Act Fast - 100% up to a whopping €500": "Deposit and play the biggest and best Jackpots" : FROM support durumcocataintoil@hotmail.com : FROM qrx.quickslick.com : |
2020-12-13 09:12:44 |
96.44.109.14 | attack | They hacked me |
2020-12-14 17:58:55 |