城市(city): unknown
省份(region): unknown
国家(country): Slovenia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.197.18.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39433
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;188.197.18.79. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:26:07 CST 2025
;; MSG SIZE rcvd: 106
79.18.197.188.in-addr.arpa domain name pointer internet-188-197-18-79.narocnik.mobitel.si.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
79.18.197.188.in-addr.arpa name = internet-188-197-18-79.narocnik.mobitel.si.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.88.112.63 | attack | 2019-12-09T05:04:51.616Z CLOSE host=49.88.112.63 port=17433 fd=4 time=20.015 bytes=7 ... |
2020-03-13 03:20:31 |
| 49.88.112.64 | attackspam | 2019-12-08T20:06:12.341Z CLOSE host=49.88.112.64 port=57423 fd=4 time=290.248 bytes=497 ... |
2020-03-13 03:20:13 |
| 49.145.229.205 | attackbots | 2020-02-10T06:51:23.702Z CLOSE host=49.145.229.205 port=51638 fd=4 time=20.011 bytes=29 ... |
2020-03-13 03:38:03 |
| 94.253.95.119 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-13 03:32:12 |
| 45.95.168.111 | attackbots | 2020-02-09T16:20:18.990Z CLOSE host=45.95.168.111 port=53542 fd=4 time=20.017 bytes=7 ... |
2020-03-13 03:52:37 |
| 49.49.238.240 | attackspambots | 2020-03-11T09:27:57.574Z CLOSE host=49.49.238.240 port=52908 fd=4 time=20.008 bytes=27 ... |
2020-03-13 03:26:04 |
| 49.145.102.231 | attackspam | 2019-11-05T19:32:23.559Z CLOSE host=49.145.102.231 port=12530 fd=4 time=20.016 bytes=6 ... |
2020-03-13 03:39:22 |
| 47.9.222.250 | attack | 2019-11-29T11:20:21.418Z CLOSE host=47.9.222.250 port=50902 fd=4 time=160.114 bytes=260 ... |
2020-03-13 03:41:34 |
| 103.103.147.66 | attackbots | 20/3/12@09:02:27: FAIL: Alarm-Network address from=103.103.147.66 ... |
2020-03-13 03:19:52 |
| 141.105.67.23 | attackbots | bruteforce detected |
2020-03-13 03:40:45 |
| 49.88.112.59 | attackspambots | 2019-12-09T04:24:37.173Z CLOSE host=49.88.112.59 port=54122 fd=4 time=20.005 bytes=24 ... |
2020-03-13 03:21:58 |
| 47.186.98.221 | attackbots | 2020-03-04T09:04:09.373Z CLOSE host=47.186.98.221 port=52378 fd=5 time=20.008 bytes=15 ... |
2020-03-13 03:43:36 |
| 157.230.123.253 | attackbotsspam | Mar 12 15:17:58 NPSTNNYC01T sshd[22463]: Failed password for root from 157.230.123.253 port 47738 ssh2 Mar 12 15:18:12 NPSTNNYC01T sshd[22470]: Failed password for root from 157.230.123.253 port 56212 ssh2 ... |
2020-03-13 03:25:19 |
| 46.249.32.135 | attackspambots | 2020-03-07T13:24:33.606Z CLOSE host=46.249.32.135 port=37462 fd=4 time=20.015 bytes=32 ... |
2020-03-13 03:46:51 |
| 5.165.241.86 | attack | 2020-01-26T12:17:43.801Z CLOSE host=5.165.241.86 port=50057 fd=4 time=20.020 bytes=26 ... |
2020-03-13 03:18:43 |