城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.166.220.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.166.220.79.			IN	A
;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 18:00:58 CST 2021
;; MSG SIZE  rcvd: 106Host 79.220.166.20.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 79.220.166.20.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 89.165.2.239 | attack | $f2bV_matches | 2020-09-29 21:15:42 | 
| 144.48.191.180 | attackbots | SQL Injection | 2020-09-29 21:28:08 | 
| 31.215.200.164 | attackspambots | firewall-block, port(s): 445/tcp | 2020-09-29 21:14:29 | 
| 122.202.32.70 | attack | Sep 29 10:21:57 *** sshd[20344]: Invalid user git from 122.202.32.70 | 2020-09-29 21:15:19 | 
| 111.229.57.3 | attackspambots | Invalid user uno from 111.229.57.3 port 57684 | 2020-09-29 21:14:06 | 
| 125.43.18.132 | attack | Port Scan detected! ... | 2020-09-29 21:00:19 | 
| 106.13.84.242 | attack | 2020-09-28T22:39:56.083375ks3355764 sshd[19445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242 user=root 2020-09-28T22:39:57.987202ks3355764 sshd[19445]: Failed password for root from 106.13.84.242 port 36756 ssh2 ... | 2020-09-29 21:17:49 | 
| 106.12.138.72 | attackspam | Sep 28 10:46:38 XXX sshd[60152]: Invalid user 51.254.2.202 from 106.12.138.72 port 52994 | 2020-09-29 21:10:51 | 
| 94.23.179.199 | attackbotsspam | Invalid user toor from 94.23.179.199 port 48097 | 2020-09-29 21:04:08 | 
| 103.66.96.230 | attack | Sep 29 15:19:29 buvik sshd[19955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.96.230 Sep 29 15:19:31 buvik sshd[19955]: Failed password for invalid user almir from 103.66.96.230 port 7075 ssh2 Sep 29 15:24:06 buvik sshd[20626]: Invalid user ftp from 103.66.96.230 ... | 2020-09-29 21:30:18 | 
| 180.253.166.171 | attackbotsspam | Automatic report - Port Scan Attack | 2020-09-29 21:33:14 | 
| 194.150.235.8 | attackspam | Sep 29 00:25:57 mail.srvfarm.net postfix/smtpd[2235369]: NOQUEUE: reject: RCPT from unknown[194.150.235.8]: 450 4.7.1 | 2020-09-29 21:12:02 | 
| 221.6.206.26 | attackbotsspam | Invalid user git from 221.6.206.26 port 34818 | 2020-09-29 21:22:09 | 
| 124.193.218.66 | attack | 
 | 2020-09-29 21:20:53 | 
| 186.96.102.198 | attack | Sep 29 15:07:31 PorscheCustomer sshd[25963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.102.198 Sep 29 15:07:33 PorscheCustomer sshd[25963]: Failed password for invalid user toor from 186.96.102.198 port 57309 ssh2 Sep 29 15:12:04 PorscheCustomer sshd[26055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.102.198 ... | 2020-09-29 21:25:43 |