城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.168.107.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.168.107.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 04:42:05 CST 2025
;; MSG SIZE rcvd: 106
18.107.168.99.in-addr.arpa domain name pointer adsl-99-168-107-18.rcsntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.107.168.99.in-addr.arpa name = adsl-99-168-107-18.rcsntx.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.18.203.217 | attackspambots | Unauthorised access (Sep 1) SRC=189.18.203.217 LEN=52 TOS=0x10 PREC=0x40 TTL=113 ID=17882 DF TCP DPT=445 WINDOW=8192 SYN |
2020-09-02 16:44:59 |
| 129.227.129.172 | attackspam | 1599034473 - 09/02/2020 10:14:33 Host: 129.227.129.172/129.227.129.172 Port: 1001 TCP Blocked ... |
2020-09-02 17:19:37 |
| 83.166.4.17 | attackbotsspam | Tried our host z. |
2020-09-02 17:12:38 |
| 95.161.221.111 | attack | From CCTV User Interface Log ...::ffff:95.161.221.111 - - [01/Sep/2020:12:43:08 +0000] "GET / HTTP/1.1" 200 960 ... |
2020-09-02 17:21:46 |
| 112.85.42.174 | attackspam | Failed password for root from 112.85.42.174 port 37423 ssh2 Failed password for root from 112.85.42.174 port 37423 ssh2 Failed password for root from 112.85.42.174 port 37423 ssh2 Failed password for root from 112.85.42.174 port 37423 ssh2 |
2020-09-02 17:04:45 |
| 200.39.231.33 | attackbots | Automatic report - Port Scan Attack |
2020-09-02 16:44:27 |
| 104.236.142.89 | attackbots | Invalid user bruna from 104.236.142.89 port 47720 |
2020-09-02 17:03:08 |
| 93.142.179.65 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-09-02 17:14:25 |
| 159.69.109.52 | attackbots | Unauthorized access to web resources |
2020-09-02 17:09:55 |
| 82.255.154.111 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-09-02 17:10:14 |
| 40.73.119.184 | attackbotsspam | Sep 1 23:55:51 s158375 sshd[14704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.119.184 |
2020-09-02 16:52:12 |
| 83.8.234.209 | attack | xmlrpc attack |
2020-09-02 17:10:46 |
| 49.233.90.200 | attack | Invalid user beo from 49.233.90.200 port 57860 |
2020-09-02 17:14:50 |
| 201.242.45.126 | attackbotsspam | Brute forcing RDP port 3389 |
2020-09-02 17:05:38 |
| 165.22.40.147 | attack | 11325/tcp 2991/tcp 18178/tcp... [2020-07-02/09-01]190pkt,71pt.(tcp) |
2020-09-02 17:26:11 |