城市(city): unknown
省份(region): unknown
国家(country): Ukraine
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.0.200.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.0.200.63.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:31:22 CST 2025
;; MSG SIZE  rcvd: 10563.200.0.194.in-addr.arpa domain name pointer smtp01.freehost.com.ua.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
63.200.0.194.in-addr.arpa	name = smtp01.freehost.com.ua.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 14.139.173.129 | attackspam | Nov 29 05:00:18 lanister sshd[24643]: Invalid user spolillo from 14.139.173.129 Nov 29 05:00:18 lanister sshd[24643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.173.129 Nov 29 05:00:18 lanister sshd[24643]: Invalid user spolillo from 14.139.173.129 Nov 29 05:00:20 lanister sshd[24643]: Failed password for invalid user spolillo from 14.139.173.129 port 12175 ssh2 ... | 2019-11-29 18:33:04 | 
| 168.181.49.215 | attack | 2019-11-29T10:02:41.598663abusebot-3.cloudsearch.cf sshd\[8147\]: Invalid user makya from 168.181.49.215 port 1686 | 2019-11-29 18:04:38 | 
| 150.136.152.237 | attack | Nov 29 06:39:06 XXX sshd[15480]: Did not receive identification string from 150.136.152.237 Nov 29 06:39:22 XXX sshd[15481]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed in AllowGroups Nov 29 06:39:22 XXX sshd[15481]: Received disconnect from 150.136.152.237: 11: Normal Shutdown, Thank you for playing [preauth] Nov 29 06:39:22 XXX sshd[15483]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed in AllowGroups Nov 29 06:39:22 XXX sshd[15483]: Received disconnect from 150.136.152.237: 11: Normal Shutdown, Thank you for playing [preauth] Nov 29 06:39:24 XXX sshd[15485]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed in AllowGroups Nov 29 06:39:25 XXX sshd[15485]: Received disconnect from 150.136.152.237: 11: Normal Shutdown, Thank you for playing [preauth] Nov 29 06:39:26 XXX sshd[15487]: User r.r from 150.136.152.237 not allowed because none of user's groups are listed........ ------------------------------- | 2019-11-29 18:33:50 | 
| 45.145.53.51 | attackbotsspam | Automatic report - Banned IP Access | 2019-11-29 18:14:26 | 
| 206.189.233.154 | attack | $f2bV_matches | 2019-11-29 18:23:00 | 
| 104.248.37.88 | attackbots | F2B jail: sshd. Time: 2019-11-29 09:24:05, Reported by: VKReport | 2019-11-29 18:26:48 | 
| 123.28.139.176 | attackspambots | Fail2Ban Ban Triggered | 2019-11-29 18:02:44 | 
| 202.43.148.172 | attackspambots | Automatic report - Port Scan Attack | 2019-11-29 18:22:44 | 
| 106.54.123.84 | attack | Nov 29 11:28:16 ArkNodeAT sshd\[14397\]: Invalid user gabia from 106.54.123.84 Nov 29 11:28:16 ArkNodeAT sshd\[14397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 Nov 29 11:28:18 ArkNodeAT sshd\[14397\]: Failed password for invalid user gabia from 106.54.123.84 port 50852 ssh2 | 2019-11-29 18:39:08 | 
| 99.90.93.80 | attack | RDP Bruteforce | 2019-11-29 18:15:07 | 
| 112.85.42.238 | attackbotsspam | Nov 29 10:55:07 h2177944 sshd\[14026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238 user=root Nov 29 10:55:09 h2177944 sshd\[14026\]: Failed password for root from 112.85.42.238 port 44039 ssh2 Nov 29 10:55:11 h2177944 sshd\[14026\]: Failed password for root from 112.85.42.238 port 44039 ssh2 Nov 29 10:55:14 h2177944 sshd\[14026\]: Failed password for root from 112.85.42.238 port 44039 ssh2 ... | 2019-11-29 18:25:50 | 
| 164.52.24.167 | attackbots | Automatic report - Banned IP Access | 2019-11-29 18:26:08 | 
| 75.190.98.206 | attack | port scan and connect, tcp 1433 (ms-sql-s) | 2019-11-29 18:01:53 | 
| 103.57.123.1 | attack | Nov 29 07:15:29 eventyay sshd[477]: Failed password for root from 103.57.123.1 port 49984 ssh2 Nov 29 07:19:42 eventyay sshd[545]: Failed password for news from 103.57.123.1 port 52702 ssh2 Nov 29 07:23:47 eventyay sshd[617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.123.1 ... | 2019-11-29 18:34:05 | 
| 202.28.35.174 | attackbotsspam | Nov 29 07:24:13 arianus sshd\[12158\]: User ***user*** from 202.28.35.174 not allowed because none of user's groups are listed in AllowGroups ... | 2019-11-29 18:19:28 |