城市(city): Ufa
省份(region): Bashkortostan
国家(country): Russia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 145.255.8.173 | attackspambots | Unauthorized connection attempt from IP address 145.255.8.173 on Port 445(SMB) |
2020-08-23 07:20:28 |
| 145.255.8.111 | attackspambots | Unauthorized connection attempt detected from IP address 145.255.8.111 to port 445 |
2019-12-28 21:28:28 |
| 145.255.8.67 | attackspam | 3389BruteforceFW21 |
2019-06-30 12:58:20 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '145.255.0.0 - 145.255.15.255'
% Abuse contact for '145.255.0.0 - 145.255.15.255' is 'abuse@ufanet.ru'
inetnum: 145.255.0.0 - 145.255.15.255
netname: UBN
descr: JSC "Ufanet"
descr: Ufa, Russia
country: RU
admin-c: UN1646-RIPE
tech-c: UN1646-RIPE
status: ASSIGNED PA
mnt-by: UBN-MNT
created: 2012-08-22T07:52:35Z
last-modified: 2018-08-02T03:10:16Z
source: RIPE
role: Ufanet NOC
address: pr. Oktyabrya, 4/3
address: Ufa, Russia
org: ORG-Zs2-RIPE
admin-c: DK9362-RIPE
tech-c: RK10446-RIPE
abuse-mailbox: abuse@ufanet.ru
nic-hdl: UN1646-RIPE
mnt-by: UBN-MNT
created: 2018-06-06T11:54:33Z
last-modified: 2024-01-10T11:55:31Z
source: RIPE # Filtered
% Information related to '145.255.8.0/24AS24955'
route: 145.255.8.0/24
descr: JSC "Ufanet", Ufa, Russia
origin: AS24955
mnt-by: UBN-MNT
created: 2015-12-30T14:41:38Z
last-modified: 2015-12-30T14:41:38Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.1 (BUSA)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.255.8.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.255.8.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 20:11:29 CST 2026
;; MSG SIZE rcvd: 106
168.8.255.145.in-addr.arpa domain name pointer 145.255.8.168.dynamic.ufanet.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
168.8.255.145.in-addr.arpa name = 145.255.8.168.dynamic.ufanet.ru.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 186.136.207.241 | attack | Feb 22 06:01:59 firewall sshd[3993]: Invalid user minecraft from 186.136.207.241 Feb 22 06:02:01 firewall sshd[3993]: Failed password for invalid user minecraft from 186.136.207.241 port 37492 ssh2 Feb 22 06:05:30 firewall sshd[4157]: Invalid user nagios from 186.136.207.241 ... |
2020-02-22 17:42:02 |
| 5.255.250.190 | attackspambots | port scan and connect, tcp 80 (http) |
2020-02-22 17:11:16 |
| 119.29.92.35 | attack | Brute force SMTP login attempted. ... |
2020-02-22 17:33:42 |
| 37.9.87.152 | attack | port scan and connect, tcp 80 (http) |
2020-02-22 17:17:49 |
| 54.36.182.244 | attackbotsspam | Brute-force attempt banned |
2020-02-22 17:46:35 |
| 195.70.38.40 | attackbotsspam | Invalid user testing from 195.70.38.40 port 35276 |
2020-02-22 17:12:45 |
| 185.39.11.28 | attack | Feb 22 09:20:18 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\ |
2020-02-22 17:27:47 |
| 191.33.63.163 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-22 17:14:24 |
| 103.48.25.194 | attack | 1582346867 - 02/22/2020 05:47:47 Host: 103.48.25.194/103.48.25.194 Port: 445 TCP Blocked |
2020-02-22 17:38:27 |
| 148.235.82.68 | attack | Feb 21 18:43:44 kapalua sshd\[31918\]: Invalid user liuzunpeng from 148.235.82.68 Feb 21 18:43:44 kapalua sshd\[31918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.82.68 Feb 21 18:43:46 kapalua sshd\[31918\]: Failed password for invalid user liuzunpeng from 148.235.82.68 port 45350 ssh2 Feb 21 18:47:48 kapalua sshd\[32252\]: Invalid user uploader from 148.235.82.68 Feb 21 18:47:48 kapalua sshd\[32252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.82.68 |
2020-02-22 17:37:07 |
| 92.198.37.59 | attackbotsspam | Feb 22 10:21:04 localhost sshd\[30408\]: Invalid user kigwasshoi from 92.198.37.59 port 61513 Feb 22 10:21:04 localhost sshd\[30408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.198.37.59 Feb 22 10:21:05 localhost sshd\[30408\]: Failed password for invalid user kigwasshoi from 92.198.37.59 port 61513 ssh2 |
2020-02-22 17:35:28 |
| 86.35.221.136 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-22 17:44:45 |
| 36.224.61.237 | attackspam | SSH login attempts brute force. |
2020-02-22 17:12:23 |
| 128.199.235.18 | attack | Invalid user tomcat from 128.199.235.18 port 54972 |
2020-02-22 17:42:21 |
| 54.38.18.211 | attackbotsspam | Feb 21 23:02:14 php1 sshd\[9969\]: Invalid user readnews from 54.38.18.211 Feb 21 23:02:14 php1 sshd\[9969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211 Feb 21 23:02:16 php1 sshd\[9969\]: Failed password for invalid user readnews from 54.38.18.211 port 46960 ssh2 Feb 21 23:04:53 php1 sshd\[10265\]: Invalid user ec2-user from 54.38.18.211 Feb 21 23:04:53 php1 sshd\[10265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211 |
2020-02-22 17:34:01 |