城市(city): Ho Chi Minh City
省份(region): unknown
国家(country): Vietnam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.52.105.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.52.105.61. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102900 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 29 14:57:15 CST 2025
;; MSG SIZE rcvd: 106
Host 61.105.52.164.in-addr.arpa not found: 2(SERVFAIL)
server can't find 164.52.105.61.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 159.203.81.28 | attackspam | Fail2Ban Ban Triggered |
2020-08-27 01:14:43 |
| 45.134.179.243 | attackbots | *Port Scan* detected from 45.134.179.243 (NL/Netherlands/South Holland/Rotterdam/-). 4 hits in the last 191 seconds |
2020-08-27 01:17:47 |
| 51.38.238.205 | attackbotsspam | $f2bV_matches |
2020-08-27 01:39:00 |
| 104.131.55.92 | attackspambots | SSH Brute Force |
2020-08-27 01:34:00 |
| 49.235.138.168 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-26T13:16:14Z and 2020-08-26T13:28:07Z |
2020-08-27 01:39:16 |
| 185.176.27.42 | attack | [H1.VM7] Blocked by UFW |
2020-08-27 00:59:26 |
| 91.134.143.172 | attackbots | Aug 25 01:24:19 vlre-nyc-1 sshd\[27222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.143.172 user=root Aug 25 01:24:21 vlre-nyc-1 sshd\[27222\]: Failed password for root from 91.134.143.172 port 55748 ssh2 Aug 25 01:28:21 vlre-nyc-1 sshd\[27298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.143.172 user=root Aug 25 01:28:23 vlre-nyc-1 sshd\[27298\]: Failed password for root from 91.134.143.172 port 36482 ssh2 Aug 25 01:32:08 vlre-nyc-1 sshd\[27367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.143.172 user=root Aug 25 01:32:10 vlre-nyc-1 sshd\[27367\]: Failed password for root from 91.134.143.172 port 45446 ssh2 Aug 25 01:35:58 vlre-nyc-1 sshd\[27436\]: Invalid user thor from 91.134.143.172 Aug 25 01:35:58 vlre-nyc-1 sshd\[27436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=9 ... |
2020-08-27 01:36:16 |
| 64.227.125.204 | attackbots |
|
2020-08-27 01:03:05 |
| 192.241.220.50 | attackbots | scans once in preceeding hours on the ports (in chronological order) 9042 resulting in total of 38 scans from 192.241.128.0/17 block. |
2020-08-27 01:08:37 |
| 62.234.110.91 | attackbots | SSH Brute Force |
2020-08-27 01:37:38 |
| 106.12.175.86 | attack | SSH login attempts. |
2020-08-27 01:33:34 |
| 117.83.83.235 | attack | SSH Brute Force |
2020-08-27 01:30:37 |
| 79.120.118.82 | attackspambots | Aug 26 17:35:19 dev0-dcde-rnet sshd[29167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82 Aug 26 17:35:20 dev0-dcde-rnet sshd[29167]: Failed password for invalid user frida from 79.120.118.82 port 40442 ssh2 Aug 26 17:38:10 dev0-dcde-rnet sshd[29189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82 |
2020-08-27 01:22:56 |
| 202.179.76.187 | attackbots | Aug 26 18:50:11 OPSO sshd\[3272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.76.187 user=root Aug 26 18:50:13 OPSO sshd\[3272\]: Failed password for root from 202.179.76.187 port 50836 ssh2 Aug 26 18:55:03 OPSO sshd\[4032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.76.187 user=root Aug 26 18:55:05 OPSO sshd\[4032\]: Failed password for root from 202.179.76.187 port 58332 ssh2 Aug 26 18:59:29 OPSO sshd\[4453\]: Invalid user j from 202.179.76.187 port 37596 Aug 26 18:59:29 OPSO sshd\[4453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.76.187 |
2020-08-27 01:23:54 |
| 49.232.161.242 | attack | 2020-08-26T17:03:52.762540vps-d63064a2 sshd[49430]: Invalid user vnc from 49.232.161.242 port 53224 2020-08-26T17:03:54.174099vps-d63064a2 sshd[49430]: Failed password for invalid user vnc from 49.232.161.242 port 53224 ssh2 2020-08-26T17:06:41.975122vps-d63064a2 sshd[49460]: User root from 49.232.161.242 not allowed because not listed in AllowUsers 2020-08-26T17:06:41.996407vps-d63064a2 sshd[49460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.161.242 user=root 2020-08-26T17:06:41.975122vps-d63064a2 sshd[49460]: User root from 49.232.161.242 not allowed because not listed in AllowUsers 2020-08-26T17:06:44.268266vps-d63064a2 sshd[49460]: Failed password for invalid user root from 49.232.161.242 port 51950 ssh2 ... |
2020-08-27 01:40:02 |