城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.240.72.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;240.240.72.28.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 21:29:35 CST 2025
;; MSG SIZE  rcvd: 106
        Host 28.72.240.240.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 28.72.240.240.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 89.248.174.193 | attack | port  | 
                    2020-06-07 07:22:08 | 
| 106.75.214.72 | attackspam | 2020-06-06T22:31:40+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)  | 
                    2020-06-07 07:04:53 | 
| 64.225.64.215 | attackspambots | $f2bV_matches  | 
                    2020-06-07 07:08:12 | 
| 106.13.66.103 | attackbots | Jun 6 23:54:35 home sshd[4318]: Failed password for root from 106.13.66.103 port 51654 ssh2 Jun 6 23:58:03 home sshd[4731]: Failed password for root from 106.13.66.103 port 50930 ssh2 ...  | 
                    2020-06-07 07:16:45 | 
| 201.62.66.22 | attack | Brute force attempt  | 
                    2020-06-07 07:22:40 | 
| 220.134.220.129 | attackspam | Port probing on unauthorized port 88  | 
                    2020-06-07 07:20:51 | 
| 198.100.45.156 | attackbotsspam | Port scan on 1 port(s): 6379  | 
                    2020-06-07 07:03:38 | 
| 45.134.179.122 | attack | [H1] Blocked by UFW  | 
                    2020-06-07 07:25:46 | 
| 191.162.232.235 | attackspambots | SASL PLAIN auth failed: ruser=...  | 
                    2020-06-07 07:05:51 | 
| 117.50.40.157 | attackspam | Invalid user peu01 from 117.50.40.157 port 52740  | 
                    2020-06-07 07:12:16 | 
| 106.13.215.17 | attackbotsspam | Jun 6 23:45:44 santamaria sshd\[27733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.215.17 user=root Jun 6 23:45:47 santamaria sshd\[27733\]: Failed password for root from 106.13.215.17 port 46810 ssh2 Jun 6 23:48:52 santamaria sshd\[27812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.215.17 user=root ...  | 
                    2020-06-07 07:10:51 | 
| 103.105.128.194 | attack | Jun 7 00:21:48 vps sshd[397815]: Failed password for root from 103.105.128.194 port 62059 ssh2 Jun 7 00:23:08 vps sshd[402656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194 user=root Jun 7 00:23:10 vps sshd[402656]: Failed password for root from 103.105.128.194 port 23722 ssh2 Jun 7 00:24:33 vps sshd[407748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194 user=root Jun 7 00:24:35 vps sshd[407748]: Failed password for root from 103.105.128.194 port 34535 ssh2 ...  | 
                    2020-06-07 07:19:01 | 
| 203.106.184.5 | attackbotsspam | Automatic report - Port Scan Attack  | 
                    2020-06-07 07:13:30 | 
| 106.12.74.141 | attackspambots | reported through recidive - multiple failed attempts(SSH)  | 
                    2020-06-07 07:02:30 | 
| 159.226.170.18 | attack | reported through recidive - multiple failed attempts(SSH)  | 
                    2020-06-07 06:59:22 |