城市(city): unknown
省份(region): unknown
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.16.216.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.16.216.205. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 23:39:16 CST 2025
;; MSG SIZE rcvd: 106
205.216.16.94.in-addr.arpa domain name pointer 205-216-16-94.dyn.fiber.qlnet.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
205.216.16.94.in-addr.arpa name = 205-216-16-94.dyn.fiber.qlnet.ch.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.232.105.156 | attackbots | Automated reporting of FTP Brute Force |
2019-09-29 23:22:58 |
| 59.35.93.227 | attackspam | Automated reporting of FTP Brute Force |
2019-09-29 22:42:23 |
| 54.37.151.239 | attackspambots | Sep 29 16:47:29 markkoudstaal sshd[12382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239 Sep 29 16:47:30 markkoudstaal sshd[12382]: Failed password for invalid user research from 54.37.151.239 port 60590 ssh2 Sep 29 16:51:36 markkoudstaal sshd[12787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239 |
2019-09-29 23:05:34 |
| 210.71.232.236 | attackbots | Sep 29 13:57:41 mail1 sshd\[30824\]: Invalid user wu from 210.71.232.236 port 55686 Sep 29 13:57:41 mail1 sshd\[30824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.71.232.236 Sep 29 13:57:43 mail1 sshd\[30824\]: Failed password for invalid user wu from 210.71.232.236 port 55686 ssh2 Sep 29 14:11:40 mail1 sshd\[5100\]: Invalid user xiu from 210.71.232.236 port 42240 Sep 29 14:11:40 mail1 sshd\[5100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.71.232.236 ... |
2019-09-29 23:19:33 |
| 222.186.190.2 | attackspam | Sep 29 10:53:58 ny01 sshd[11708]: Failed password for root from 222.186.190.2 port 37230 ssh2 Sep 29 10:54:02 ny01 sshd[11707]: Failed password for root from 222.186.190.2 port 50682 ssh2 Sep 29 10:54:03 ny01 sshd[11708]: Failed password for root from 222.186.190.2 port 37230 ssh2 |
2019-09-29 22:56:03 |
| 91.134.153.144 | attack | Sep 29 03:22:31 hcbb sshd\[6700\]: Invalid user wei1 from 91.134.153.144 Sep 29 03:22:31 hcbb sshd\[6700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.144 Sep 29 03:22:33 hcbb sshd\[6700\]: Failed password for invalid user wei1 from 91.134.153.144 port 52914 ssh2 Sep 29 03:26:46 hcbb sshd\[7106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.144 user=root Sep 29 03:26:49 hcbb sshd\[7106\]: Failed password for root from 91.134.153.144 port 41348 ssh2 |
2019-09-29 23:16:15 |
| 106.13.34.190 | attack | Sep 29 10:51:36 ny01 sshd[11335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.190 Sep 29 10:51:39 ny01 sshd[11335]: Failed password for invalid user taysa from 106.13.34.190 port 49994 ssh2 Sep 29 10:57:47 ny01 sshd[12744]: Failed password for mail from 106.13.34.190 port 53708 ssh2 |
2019-09-29 23:22:16 |
| 179.56.72.40 | attack | 34567/tcp 34567/tcp [2019-09-21/29]2pkt |
2019-09-29 22:39:27 |
| 77.120.113.64 | attackspambots | Sep 29 14:06:19 rotator sshd\[20745\]: Failed password for root from 77.120.113.64 port 38037 ssh2Sep 29 14:06:21 rotator sshd\[20745\]: Failed password for root from 77.120.113.64 port 38037 ssh2Sep 29 14:06:25 rotator sshd\[20745\]: Failed password for root from 77.120.113.64 port 38037 ssh2Sep 29 14:06:28 rotator sshd\[20745\]: Failed password for root from 77.120.113.64 port 38037 ssh2Sep 29 14:06:31 rotator sshd\[20745\]: Failed password for root from 77.120.113.64 port 38037 ssh2Sep 29 14:06:33 rotator sshd\[20745\]: Failed password for root from 77.120.113.64 port 38037 ssh2 ... |
2019-09-29 23:21:03 |
| 46.38.144.32 | attackspam | 15:36:30.256 1 SMTPI-126189([46.38.144.32]) failed to open 'carlo@womble.org'. Connection from [46.38.144.32]:45206. Error Code=unknown user account ... |
2019-09-29 22:44:37 |
| 203.171.227.205 | attackbotsspam | Sep 29 16:18:07 MK-Soft-VM7 sshd[29306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.171.227.205 Sep 29 16:18:09 MK-Soft-VM7 sshd[29306]: Failed password for invalid user natan from 203.171.227.205 port 53220 ssh2 ... |
2019-09-29 23:12:07 |
| 27.223.175.144 | attack | (Sep 29) LEN=40 TTL=49 ID=47814 TCP DPT=8080 WINDOW=61922 SYN (Sep 28) LEN=40 TTL=49 ID=36261 TCP DPT=8080 WINDOW=61922 SYN (Sep 27) LEN=40 TTL=49 ID=25357 TCP DPT=8080 WINDOW=15173 SYN (Sep 27) LEN=40 TTL=49 ID=49553 TCP DPT=8080 WINDOW=61922 SYN (Sep 27) LEN=40 TTL=49 ID=62897 TCP DPT=8080 WINDOW=61922 SYN (Sep 26) LEN=40 TTL=49 ID=20779 TCP DPT=8080 WINDOW=61922 SYN (Sep 25) LEN=40 TTL=49 ID=7056 TCP DPT=8080 WINDOW=15173 SYN (Sep 25) LEN=40 TTL=49 ID=41239 TCP DPT=8080 WINDOW=61922 SYN (Sep 24) LEN=40 TTL=49 ID=12746 TCP DPT=8080 WINDOW=55449 SYN (Sep 24) LEN=40 TTL=48 ID=38207 TCP DPT=8080 WINDOW=64938 SYN (Sep 24) LEN=40 TTL=49 ID=38297 TCP DPT=8080 WINDOW=55449 SYN (Sep 23) LEN=40 TTL=49 ID=7683 TCP DPT=8080 WINDOW=64938 SYN (Sep 23) LEN=40 TTL=49 ID=34943 TCP DPT=8080 WINDOW=64938 SYN (Sep 22) LEN=40 TTL=49 ID=58337 TCP DPT=8080 WINDOW=64938 SYN (Sep 22) LEN=40 TTL=49 ID=40510 TCP DPT=8080 WINDOW=55449 SYN |
2019-09-29 23:00:51 |
| 115.84.121.80 | attack | Sep 29 16:57:37 core sshd[5190]: Invalid user feedback from 115.84.121.80 port 41408 Sep 29 16:57:39 core sshd[5190]: Failed password for invalid user feedback from 115.84.121.80 port 41408 ssh2 ... |
2019-09-29 22:59:04 |
| 177.15.136.194 | attackspam | Sep 27 22:24:55 cumulus sshd[24196]: Invalid user test2 from 177.15.136.194 port 58130 Sep 27 22:24:55 cumulus sshd[24196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.15.136.194 Sep 27 22:24:57 cumulus sshd[24196]: Failed password for invalid user test2 from 177.15.136.194 port 58130 ssh2 Sep 27 22:24:57 cumulus sshd[24196]: Received disconnect from 177.15.136.194 port 58130:11: Bye Bye [preauth] Sep 27 22:24:57 cumulus sshd[24196]: Disconnected from 177.15.136.194 port 58130 [preauth] Sep 27 22:42:58 cumulus sshd[24983]: Invalid user cl from 177.15.136.194 port 56778 Sep 27 22:42:58 cumulus sshd[24983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.15.136.194 Sep 27 22:43:00 cumulus sshd[24983]: Failed password for invalid user cl from 177.15.136.194 port 56778 ssh2 Sep 27 22:43:00 cumulus sshd[24983]: Received disconnect from 177.15.136.194 port 56778:11: Bye Bye [preauth] S........ ------------------------------- |
2019-09-29 23:26:04 |
| 103.3.226.228 | attackspam | Sep 29 14:25:45 mail sshd\[18893\]: Invalid user finn from 103.3.226.228 Sep 29 14:25:45 mail sshd\[18893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.228 Sep 29 14:25:47 mail sshd\[18893\]: Failed password for invalid user finn from 103.3.226.228 port 50664 ssh2 ... |
2019-09-29 23:22:38 |