城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.231.208.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.231.208.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 10:45:43 CST 2025
;; MSG SIZE rcvd: 108
b'Host 164.208.231.204.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 204.231.208.164.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.145 | attackspambots | Failed password for root from 218.92.0.145 port 21123 ssh2 |
2020-08-16 07:38:32 |
| 2001:41d0:a:66c5::1 | attackspam | xmlrpc attack |
2020-08-16 07:28:14 |
| 59.124.6.166 | attackspam | Fail2Ban |
2020-08-16 07:21:15 |
| 190.21.36.225 | attack | Aug 16 00:41:11 host sshd[6947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-36-225.baf.movistar.cl user=root Aug 16 00:41:13 host sshd[6947]: Failed password for root from 190.21.36.225 port 51992 ssh2 ... |
2020-08-16 07:23:15 |
| 217.182.67.242 | attackbots | $f2bV_matches |
2020-08-16 07:08:32 |
| 132.232.4.140 | attackspam | 2020-08-15T23:06:51.847784shield sshd\[23106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.140 user=root 2020-08-15T23:06:53.760846shield sshd\[23106\]: Failed password for root from 132.232.4.140 port 45364 ssh2 2020-08-15T23:09:56.925157shield sshd\[23369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.140 user=root 2020-08-15T23:09:58.903201shield sshd\[23369\]: Failed password for root from 132.232.4.140 port 32922 ssh2 2020-08-15T23:13:04.333595shield sshd\[23720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.140 user=root |
2020-08-16 07:15:40 |
| 46.29.155.20 | attackspam | " " |
2020-08-16 07:35:39 |
| 37.152.181.151 | attack | Aug 15 19:02:37 firewall sshd[21359]: Failed password for root from 37.152.181.151 port 33176 ssh2 Aug 15 19:06:54 firewall sshd[21476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.151 user=root Aug 15 19:06:56 firewall sshd[21476]: Failed password for root from 37.152.181.151 port 43080 ssh2 ... |
2020-08-16 07:06:29 |
| 69.94.140.203 | attackspambots | E-Mail Spam (RBL) [REJECTED] |
2020-08-16 07:34:51 |
| 219.138.153.114 | attackbotsspam | Aug 16 01:01:52 ip106 sshd[18490]: Failed password for root from 219.138.153.114 port 49522 ssh2 ... |
2020-08-16 07:08:19 |
| 122.51.156.113 | attackbotsspam | Aug 16 00:26:41 mout sshd[19516]: Disconnected from authenticating user root 122.51.156.113 port 58844 [preauth] Aug 16 01:02:05 mout sshd[22398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.156.113 user=root Aug 16 01:02:07 mout sshd[22398]: Failed password for root from 122.51.156.113 port 53130 ssh2 |
2020-08-16 07:25:36 |
| 112.85.42.104 | attack | 2020-08-16T01:25:33.667901vps751288.ovh.net sshd\[17306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104 user=root 2020-08-16T01:25:35.947011vps751288.ovh.net sshd\[17306\]: Failed password for root from 112.85.42.104 port 55951 ssh2 2020-08-16T01:25:38.011986vps751288.ovh.net sshd\[17306\]: Failed password for root from 112.85.42.104 port 55951 ssh2 2020-08-16T01:25:40.017209vps751288.ovh.net sshd\[17306\]: Failed password for root from 112.85.42.104 port 55951 ssh2 2020-08-16T01:25:43.013482vps751288.ovh.net sshd\[17314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104 user=root |
2020-08-16 07:27:34 |
| 112.85.42.176 | attackbotsspam | 2020-08-15T23:05:57.042993shield sshd\[22975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root 2020-08-15T23:05:58.740114shield sshd\[22975\]: Failed password for root from 112.85.42.176 port 41466 ssh2 2020-08-15T23:06:01.458831shield sshd\[22975\]: Failed password for root from 112.85.42.176 port 41466 ssh2 2020-08-15T23:06:05.250759shield sshd\[22975\]: Failed password for root from 112.85.42.176 port 41466 ssh2 2020-08-15T23:06:08.259548shield sshd\[22975\]: Failed password for root from 112.85.42.176 port 41466 ssh2 |
2020-08-16 07:21:48 |
| 101.206.239.201 | attack | Aug 16 01:05:17 cp sshd[6519]: Failed password for root from 101.206.239.201 port 40098 ssh2 Aug 16 01:09:35 cp sshd[8801]: Failed password for root from 101.206.239.201 port 48938 ssh2 |
2020-08-16 07:28:57 |
| 14.56.180.103 | attackbotsspam | Aug 16 00:52:37 minden010 sshd[1145]: Failed password for root from 14.56.180.103 port 44072 ssh2 Aug 16 00:57:12 minden010 sshd[2923]: Failed password for root from 14.56.180.103 port 54140 ssh2 ... |
2020-08-16 07:06:48 |