城市(city): Amsterdam
省份(region): North Holland
国家(country): Netherlands
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.20.116.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.20.116.66.			IN	A
;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:05:08 CST 2022
;; MSG SIZE  rcvd: 106
        66.116.20.198.in-addr.arpa domain name pointer e3v3.mine.nu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
66.116.20.198.in-addr.arpa	name = e3v3.mine.nu.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 159.65.159.81 | attack | $f2bV_matches  | 
                    2020-02-08 19:48:13 | 
| 106.13.86.236 | attack | SSH Login Bruteforce  | 
                    2020-02-08 19:30:50 | 
| 111.93.4.174 | attackspambots | 2020-2-8 11:27:34 AM: failed ssh attempt  | 
                    2020-02-08 19:50:17 | 
| 118.187.4.172 | attack | 2020-2-8 11:17:00 AM: failed ssh attempt  | 
                    2020-02-08 19:59:48 | 
| 129.28.160.62 | attack | Automatic report - SSH Brute-Force Attack  | 
                    2020-02-08 19:28:40 | 
| 103.25.6.73 | attackbots | Feb 8 08:29:30 firewall sshd[16182]: Invalid user qte from 103.25.6.73 Feb 8 08:29:33 firewall sshd[16182]: Failed password for invalid user qte from 103.25.6.73 port 53948 ssh2 Feb 8 08:36:58 firewall sshd[16503]: Invalid user nwf from 103.25.6.73 ...  | 
                    2020-02-08 20:06:13 | 
| 36.81.5.200 | attackbots | 1581137440 - 02/08/2020 05:50:40 Host: 36.81.5.200/36.81.5.200 Port: 445 TCP Blocked  | 
                    2020-02-08 19:49:37 | 
| 49.235.81.23 | attackbotsspam | <6 unauthorized SSH connections  | 
                    2020-02-08 19:27:01 | 
| 36.255.233.26 | attackbots | 1581137447 - 02/08/2020 05:50:47 Host: 36.255.233.26/36.255.233.26 Port: 445 TCP Blocked  | 
                    2020-02-08 19:43:37 | 
| 89.248.168.41 | attackspam | Feb 8 11:58:59 h2177944 kernel: \[4357589.019704\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=12861 PROTO=TCP SPT=56413 DPT=1872 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 11:58:59 h2177944 kernel: \[4357589.019714\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=12861 PROTO=TCP SPT=56413 DPT=1872 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 12:03:33 h2177944 kernel: \[4357862.406916\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=31519 PROTO=TCP SPT=56413 DPT=1411 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 12:03:33 h2177944 kernel: \[4357862.406943\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=31519 PROTO=TCP SPT=56413 DPT=1411 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 8 12:27:54 h2177944 kernel: \[4359323.611946\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.41 DST=85.214.117.9  | 
                    2020-02-08 19:37:23 | 
| 73.36.232.192 | attackspam | Brute force attempt  | 
                    2020-02-08 19:56:26 | 
| 185.102.205.189 | attack | Automatic report - Port Scan Attack  | 
                    2020-02-08 19:53:59 | 
| 54.37.71.143 | attack | Feb 8 10:52:10 * sshd[14655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.143 Feb 8 10:52:12 * sshd[14655]: Failed password for invalid user vte from 54.37.71.143 port 55295 ssh2  | 
                    2020-02-08 19:41:23 | 
| 180.124.10.172 | attackspambots | Email rejected due to spam filtering  | 
                    2020-02-08 19:33:11 | 
| 156.236.119.175 | attackbotsspam | Feb 8 11:50:29 vps647732 sshd[29887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.175 Feb 8 11:50:32 vps647732 sshd[29887]: Failed password for invalid user zpq from 156.236.119.175 port 38662 ssh2 ...  | 
                    2020-02-08 19:45:41 |