城市(city): unknown
省份(region): unknown
国家(country): Macedonia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.149.131.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.149.131.36. IN A
;; AUTHORITY SECTION:
. 321 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:10:46 CST 2022
;; MSG SIZE rcvd: 107
36.131.149.194.in-addr.arpa domain name pointer ws.ukim.mk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
36.131.149.194.in-addr.arpa name = ws.ukim.mk.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
64.169.30.61 | attackbots | Mar 19 14:08:45 vpn sshd[24268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.169.30.61 Mar 19 14:08:48 vpn sshd[24268]: Failed password for invalid user adolfo from 64.169.30.61 port 42398 ssh2 Mar 19 14:14:25 vpn sshd[24279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.169.30.61 |
2020-01-05 18:43:00 |
1.179.137.10 | attackbotsspam | <6 unauthorized SSH connections |
2020-01-05 18:48:56 |
62.4.9.221 | attackbots | May 3 23:23:10 vpn sshd[14425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.9.221 user=root May 3 23:23:12 vpn sshd[14425]: Failed password for root from 62.4.9.221 port 36710 ssh2 May 3 23:24:31 vpn sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.9.221 user=root May 3 23:24:33 vpn sshd[14433]: Failed password for root from 62.4.9.221 port 33018 ssh2 May 3 23:25:56 vpn sshd[14438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.9.221 user=root |
2020-01-05 19:04:51 |
63.142.101.182 | attackbots | Oct 7 13:19:16 vpn sshd[20507]: Invalid user pi from 63.142.101.182 Oct 7 13:19:16 vpn sshd[20509]: Invalid user pi from 63.142.101.182 Oct 7 13:19:16 vpn sshd[20507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.142.101.182 Oct 7 13:19:16 vpn sshd[20509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.142.101.182 Oct 7 13:19:19 vpn sshd[20507]: Failed password for invalid user pi from 63.142.101.182 port 52770 ssh2 |
2020-01-05 18:52:14 |
65.51.67.250 | attackspambots | Feb 19 16:14:04 vpn sshd[9515]: Invalid user admin from 65.51.67.250 Feb 19 16:14:04 vpn sshd[9515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.51.67.250 Feb 19 16:14:05 vpn sshd[9515]: Failed password for invalid user admin from 65.51.67.250 port 42607 ssh2 Feb 19 16:14:07 vpn sshd[9515]: Failed password for invalid user admin from 65.51.67.250 port 42607 ssh2 Feb 19 16:14:09 vpn sshd[9515]: Failed password for invalid user admin from 65.51.67.250 port 42607 ssh2 |
2020-01-05 18:24:38 |
51.255.35.41 | attackspambots | Unauthorized connection attempt detected from IP address 51.255.35.41 to port 2220 [J] |
2020-01-05 18:51:18 |
66.112.162.73 | attackbots | Mar 24 16:52:28 vpn sshd[6469]: Failed password for root from 66.112.162.73 port 41950 ssh2 Mar 24 17:01:53 vpn sshd[6501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.112.162.73 Mar 24 17:01:55 vpn sshd[6501]: Failed password for invalid user jq from 66.112.162.73 port 33920 ssh2 |
2020-01-05 18:22:43 |
139.219.5.139 | attackspambots | Unauthorized connection attempt detected from IP address 139.219.5.139 to port 2220 [J] |
2020-01-05 18:26:27 |
65.121.169.170 | attack | Jan 6 20:32:32 vpn sshd[7959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.121.169.170 Jan 6 20:32:34 vpn sshd[7959]: Failed password for invalid user cirros from 65.121.169.170 port 34678 ssh2 Jan 6 20:35:49 vpn sshd[7980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.121.169.170 |
2020-01-05 18:31:01 |
62.59.24.55 | attackspam | Mar 11 18:32:18 vpn sshd[3869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.59.24.55 Mar 11 18:32:20 vpn sshd[3869]: Failed password for invalid user sinusbot2 from 62.59.24.55 port 44010 ssh2 Mar 11 18:37:53 vpn sshd[3888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.59.24.55 |
2020-01-05 19:02:57 |
64.76.6.126 | attackbots | Unauthorized connection attempt detected from IP address 64.76.6.126 to port 22 |
2020-01-05 18:32:28 |
62.42.95.158 | attackspambots | Oct 8 04:21:56 vpn sshd[22823]: Invalid user pi from 62.42.95.158 Oct 8 04:21:56 vpn sshd[22821]: Invalid user pi from 62.42.95.158 Oct 8 04:21:56 vpn sshd[22823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.42.95.158 Oct 8 04:21:56 vpn sshd[22821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.42.95.158 Oct 8 04:21:59 vpn sshd[22823]: Failed password for invalid user pi from 62.42.95.158 port 43996 ssh2 |
2020-01-05 19:03:21 |
65.52.171.12 | attack | Feb 28 05:06:02 vpn sshd[3667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.52.171.12 Feb 28 05:06:04 vpn sshd[3667]: Failed password for invalid user tester from 65.52.171.12 port 57624 ssh2 Feb 28 05:13:02 vpn sshd[3696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.52.171.12 |
2020-01-05 18:23:15 |
62.76.74.180 | attack | Mar 15 08:27:42 vpn sshd[26002]: Failed password for root from 62.76.74.180 port 56372 ssh2 Mar 15 08:34:45 vpn sshd[26019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.76.74.180 Mar 15 08:34:47 vpn sshd[26019]: Failed password for invalid user anto from 62.76.74.180 port 46805 ssh2 |
2020-01-05 18:59:14 |
63.34.33.60 | attack | Mar 9 20:27:44 vpn sshd[25277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.34.33.60 Mar 9 20:27:46 vpn sshd[25277]: Failed password for invalid user transfer from 63.34.33.60 port 28050 ssh2 Mar 9 20:34:08 vpn sshd[25285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.34.33.60 |
2020-01-05 18:51:03 |