城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.179.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41383
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.179.188.			IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:26:32 CST 2022
;; MSG SIZE  rcvd: 107
        188.179.207.14.in-addr.arpa domain name pointer mx-ll-14.207.179-188.dynamic.3bb.in.th.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
188.179.207.14.in-addr.arpa	name = mx-ll-14.207.179-188.dynamic.3bb.in.th.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 92.63.194.25 | attackspambots | Apr 4 03:45:07 vmd26974 sshd[12451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.25 Apr 4 03:45:09 vmd26974 sshd[12451]: Failed password for invalid user Administrator from 92.63.194.25 port 45767 ssh2 ...  | 
                    2020-04-04 09:48:55 | 
| 159.89.180.30 | attackbots | 'Fail2Ban'  | 
                    2020-04-04 10:08:50 | 
| 192.144.156.68 | attack | Apr 1 00:45:30 sip sshd[8560]: Failed password for root from 192.144.156.68 port 32982 ssh2 Apr 1 00:58:38 sip sshd[11763]: Failed password for root from 192.144.156.68 port 35496 ssh2  | 
                    2020-04-04 10:17:19 | 
| 222.82.237.238 | attackspam | Apr 4 01:39:33 lukav-desktop sshd\[11327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 user=root Apr 4 01:39:35 lukav-desktop sshd\[11327\]: Failed password for root from 222.82.237.238 port 47065 ssh2 Apr 4 01:43:40 lukav-desktop sshd\[11624\]: Invalid user ql from 222.82.237.238 Apr 4 01:43:40 lukav-desktop sshd\[11624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 Apr 4 01:43:42 lukav-desktop sshd\[11624\]: Failed password for invalid user ql from 222.82.237.238 port 21829 ssh2  | 
                    2020-04-04 09:58:41 | 
| 192.241.238.27 | attack | " "  | 
                    2020-04-04 10:11:46 | 
| 124.29.236.163 | attackbotsspam | $f2bV_matches  | 
                    2020-04-04 09:46:24 | 
| 61.161.250.202 | attack | Invalid user admin from 61.161.250.202 port 45438  | 
                    2020-04-04 10:05:46 | 
| 68.183.219.43 | attack | Mar 30 11:19:03 prox sshd[2571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43 Mar 30 11:19:05 prox sshd[2571]: Failed password for invalid user kuz from 68.183.219.43 port 38688 ssh2  | 
                    2020-04-04 10:01:32 | 
| 68.183.19.84 | attackbots | Apr 4 00:14:10 host sshd[54564]: Invalid user falcon2 from 68.183.19.84 port 58604 ...  | 
                    2020-04-04 09:49:51 | 
| 185.53.88.39 | attackspam | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak  | 
                    2020-04-04 09:43:21 | 
| 106.13.38.246 | attackbots | SSH authentication failure x 6 reported by Fail2Ban ...  | 
                    2020-04-04 09:42:30 | 
| 180.76.141.184 | attack | Apr 4 01:03:21 lukav-desktop sshd\[31200\]: Invalid user shoutcast from 180.76.141.184 Apr 4 01:03:21 lukav-desktop sshd\[31200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.184 Apr 4 01:03:22 lukav-desktop sshd\[31200\]: Failed password for invalid user shoutcast from 180.76.141.184 port 45388 ssh2 Apr 4 01:05:32 lukav-desktop sshd\[19363\]: Invalid user sca from 180.76.141.184 Apr 4 01:05:32 lukav-desktop sshd\[19363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.184  | 
                    2020-04-04 09:46:44 | 
| 188.166.232.29 | attackbotsspam | Apr 2 01:04:43 prox sshd[372]: Failed password for root from 188.166.232.29 port 50740 ssh2  | 
                    2020-04-04 09:38:30 | 
| 45.252.248.23 | attackspam | Apr 4 01:56:35 karger wordpress(buerg)[4145]: Authentication attempt for unknown user domi from 45.252.248.23 Apr 4 03:37:01 karger wordpress(buerg)[4145]: Authentication attempt for unknown user domi from 45.252.248.23 ...  | 
                    2020-04-04 09:57:10 | 
| 68.183.35.70 | attackbotsspam | Attempted connection to port 28017.  | 
                    2020-04-04 10:05:18 |