城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.199.187.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.199.187.136. IN A
;; AUTHORITY SECTION:
. 383 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019101400 1800 900 604800 86400
;; Query time: 316 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 14 19:49:55 CST 2019
;; MSG SIZE rcvd: 118
136.187.199.99.in-addr.arpa domain name pointer d99-199-187-136.bchsia.telus.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
136.187.199.99.in-addr.arpa name = d99-199-187-136.bchsia.telus.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 96.126.103.73 | attackspambots | Unauthorized connection attempt detected from IP address 96.126.103.73 to port 2082 [J] |
2020-01-28 07:12:54 |
| 168.90.91.170 | attackbotsspam | Honeypot attack, port: 445, PTR: 170.91.90.168.static.megalinkpi.net.br. |
2020-01-28 07:26:24 |
| 91.20.100.81 | attackspam | 2019-11-25 01:34:04 1iZ2KH-0005cR-Mk SMTP connection from p5b146451.dip0.t-ipconnect.de \[91.20.100.81\]:18966 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-11-25 01:34:09 1iZ2KN-0005cn-9O SMTP connection from p5b146451.dip0.t-ipconnect.de \[91.20.100.81\]:19007 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-11-25 01:34:13 1iZ2KR-0005cu-Rk SMTP connection from p5b146451.dip0.t-ipconnect.de \[91.20.100.81\]:19033 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 07:25:23 |
| 182.112.211.69 | attack | 23/tcp [2020-01-27]1pkt |
2020-01-28 07:34:49 |
| 91.195.92.122 | attackbotsspam | 2019-03-14 22:09:03 H=\(host-91-195-92-122.wieszowanet.pl\) \[91.195.92.122\]:47003 I=\[193.107.88.166\]:25 F=\ |
2020-01-28 07:30:17 |
| 73.229.232.218 | attackbots | $f2bV_matches |
2020-01-28 07:33:48 |
| 91.191.41.13 | attackbots | 2019-09-16 21:48:25 1i9wz2-0003eK-Ry SMTP connection from \(41.191.91.si13.zona.ba\) \[91.191.41.13\]:39803 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 21:48:36 1i9wzD-0003eX-5y SMTP connection from \(41.191.91.si13.zona.ba\) \[91.191.41.13\]:39873 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 21:48:44 1i9wzK-0003ei-08 SMTP connection from \(41.191.91.si13.zona.ba\) \[91.191.41.13\]:39924 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 07:33:21 |
| 91.228.217.21 | attack | 2019-09-16 20:33:56 1i9voy-0001NE-8g SMTP connection from \(\[91.228.217.21\]\) \[91.228.217.21\]:31744 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 20:34:18 1i9vpJ-0001O3-1U SMTP connection from \(\[91.228.217.21\]\) \[91.228.217.21\]:31934 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 20:34:30 1i9vpV-0001OF-N3 SMTP connection from \(\[91.228.217.21\]\) \[91.228.217.21\]:32078 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 06:59:17 |
| 91.197.64.60 | attackspam | 2019-01-31 15:27:41 H=\(nat33.teleconnect.ru\) \[91.197.64.60\]:20870 I=\[193.107.88.166\]:25 F=\ |
2020-01-28 07:27:28 |
| 218.50.76.209 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-01-28 07:36:15 |
| 190.202.124.107 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-28 06:59:45 |
| 79.166.7.119 | attackbotsspam | Telnet Server BruteForce Attack |
2020-01-28 07:38:10 |
| 81.12.5.136 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-28 07:17:05 |
| 186.155.214.180 | attack | Unauthorized connection attempt detected from IP address 186.155.214.180 to port 8080 [J] |
2020-01-28 07:32:35 |
| 91.193.208.132 | attackbots | 2019-02-01 08:35:47 H=91-193-208-132.eimperium.pl \[91.193.208.132\]:26744 I=\[193.107.88.166\]:25 F=\ |
2020-01-28 07:31:33 |