城市(city): Prague
省份(region): Prague - the Capital (Praha - hlavni mesto)
国家(country): Czechia
运营商(isp): Vodafone
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.220.208.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.220.208.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 10:28:02 CST 2025
;; MSG SIZE rcvd: 108
164.208.220.213.in-addr.arpa domain name pointer ip-213-220-208-164.bb.vodafone.cz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.208.220.213.in-addr.arpa name = ip-213-220-208-164.bb.vodafone.cz.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.143.220.110 | attackbots | [MK-Root1] Blocked by UFW |
2020-06-10 01:42:25 |
| 120.71.144.35 | attack | Failed password for invalid user qdba from 120.71.144.35 port 50714 ssh2 |
2020-06-10 01:36:46 |
| 115.79.28.118 | attack | Port scan denied |
2020-06-10 01:39:21 |
| 117.50.63.120 | attack | ssh brute force |
2020-06-10 02:02:17 |
| 85.113.20.234 | attackbots | RCPT=EAVAIL |
2020-06-10 01:47:47 |
| 81.169.185.148 | attackbots | spam |
2020-06-10 01:28:24 |
| 116.110.121.91 | attackbots | Port probing on unauthorized port 445 |
2020-06-10 01:45:32 |
| 120.53.23.24 | attack | web-1 [ssh] SSH Attack |
2020-06-10 01:38:47 |
| 34.68.210.48 | attackspambots | Jun 9 16:08:42 h2427292 sshd\[9251\]: Invalid user test from 34.68.210.48 Jun 9 16:08:45 h2427292 sshd\[9251\]: Failed password for invalid user test from 34.68.210.48 port 44832 ssh2 Jun 9 16:09:09 h2427292 sshd\[9873\]: Invalid user redhat from 34.68.210.48 ... |
2020-06-10 01:37:47 |
| 222.186.180.142 | attackspambots | Jun 9 19:34:59 piServer sshd[27333]: Failed password for root from 222.186.180.142 port 41342 ssh2 Jun 9 19:35:02 piServer sshd[27333]: Failed password for root from 222.186.180.142 port 41342 ssh2 Jun 9 19:35:05 piServer sshd[27333]: Failed password for root from 222.186.180.142 port 41342 ssh2 ... |
2020-06-10 01:36:28 |
| 194.87.93.189 | attack | (sshd) Failed SSH login from 194.87.93.189 (RU/Russia/ptr.ruvds.com): 5 in the last 3600 secs |
2020-06-10 02:03:52 |
| 178.128.242.233 | attackspambots | Jun 9 09:05:18 ny01 sshd[2078]: Failed password for root from 178.128.242.233 port 57970 ssh2 Jun 9 09:08:41 ny01 sshd[2532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233 Jun 9 09:08:43 ny01 sshd[2532]: Failed password for invalid user bVM from 178.128.242.233 port 60890 ssh2 |
2020-06-10 02:07:04 |
| 167.249.136.4 | attackbotsspam | spam |
2020-06-10 01:47:32 |
| 85.21.78.213 | attack | $f2bV_matches |
2020-06-10 01:33:12 |
| 212.75.29.229 | attackspam | Automatic report - XMLRPC Attack |
2020-06-10 02:01:59 |