城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.40.213.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.40.213.53. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:24:37 CST 2025
;; MSG SIZE rcvd: 105
53.213.40.94.in-addr.arpa domain name pointer 94-40-213-53.tktelekom.pl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
53.213.40.94.in-addr.arpa name = 94-40-213-53.tktelekom.pl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 154.223.136.126 | attackspambots | Brute forcing RDP port 3389 |
2019-12-04 02:59:44 |
| 106.13.95.27 | attack | Brute force attempt |
2019-12-04 03:02:24 |
| 103.210.19.141 | attack | 2019-12-03T18:36:33.418953shield sshd\[8348\]: Invalid user podolsky from 103.210.19.141 port 43098 2019-12-03T18:36:33.423141shield sshd\[8348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.19.141 2019-12-03T18:36:35.464170shield sshd\[8348\]: Failed password for invalid user podolsky from 103.210.19.141 port 43098 ssh2 2019-12-03T18:43:39.500604shield sshd\[9703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.19.141 user=root 2019-12-03T18:43:41.356208shield sshd\[9703\]: Failed password for root from 103.210.19.141 port 54406 ssh2 |
2019-12-04 02:58:23 |
| 193.70.37.140 | attackbots | Dec 3 19:48:53 OPSO sshd\[16141\]: Invalid user caratjas from 193.70.37.140 port 44590 Dec 3 19:48:53 OPSO sshd\[16141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.37.140 Dec 3 19:48:55 OPSO sshd\[16141\]: Failed password for invalid user caratjas from 193.70.37.140 port 44590 ssh2 Dec 3 19:54:15 OPSO sshd\[17975\]: Invalid user fc from 193.70.37.140 port 55028 Dec 3 19:54:15 OPSO sshd\[17975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.37.140 |
2019-12-04 03:04:46 |
| 106.12.132.187 | attackbots | Dec 3 16:49:22 markkoudstaal sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 Dec 3 16:49:24 markkoudstaal sshd[10500]: Failed password for invalid user ztidc from 106.12.132.187 port 48932 ssh2 Dec 3 16:57:00 markkoudstaal sshd[11299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 |
2019-12-04 02:46:11 |
| 186.215.40.101 | attack | Automatic report - Port Scan Attack |
2019-12-04 03:23:06 |
| 191.241.242.68 | attackspambots | Dec 3 18:54:37 localhost sshd\[22991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.242.68 user=root Dec 3 18:54:39 localhost sshd\[22991\]: Failed password for root from 191.241.242.68 port 13638 ssh2 Dec 3 19:01:50 localhost sshd\[23261\]: Invalid user taurick from 191.241.242.68 port 38752 Dec 3 19:01:50 localhost sshd\[23261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.242.68 Dec 3 19:01:52 localhost sshd\[23261\]: Failed password for invalid user taurick from 191.241.242.68 port 38752 ssh2 ... |
2019-12-04 03:22:51 |
| 203.150.207.28 | attackspambots | Dec 2 01:41:33 admin sshd[30062]: Invalid user db2admin from 203.150.207.28 Dec 2 01:47:32 admin sshd[31089]: User admin from 28.207.150.203.sta.inet.co.th not allowed because not listed in AllowUsers Dec 2 01:54:15 admin sshd[31962]: Invalid user charles from 203.150.207.28 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=203.150.207.28 |
2019-12-04 03:12:31 |
| 196.188.42.130 | attackbots | SSH invalid-user multiple login attempts |
2019-12-04 03:00:41 |
| 131.161.54.12 | attackspam | Lines containing failures of 131.161.54.12 2019-12-02 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=131.161.54.12 |
2019-12-04 03:17:13 |
| 45.80.65.83 | attackbots | 2019-12-03T18:24:06.335346abusebot-7.cloudsearch.cf sshd\[4751\]: Invalid user itzel from 45.80.65.83 port 41774 |
2019-12-04 02:47:26 |
| 193.109.79.89 | attackspam | Dec 3 18:45:23 eventyay sshd[3651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.109.79.89 Dec 3 18:45:25 eventyay sshd[3651]: Failed password for invalid user audience from 193.109.79.89 port 35822 ssh2 Dec 3 18:51:26 eventyay sshd[3858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.109.79.89 ... |
2019-12-04 02:49:36 |
| 139.59.135.84 | attackspam | Dec 3 19:49:07 mail sshd\[27422\]: Invalid user julia from 139.59.135.84 Dec 3 19:49:07 mail sshd\[27422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84 Dec 3 19:49:09 mail sshd\[27422\]: Failed password for invalid user julia from 139.59.135.84 port 35932 ssh2 ... |
2019-12-04 03:16:47 |
| 2.224.128.111 | attack | Dec 3 19:58:20 legacy sshd[2425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.224.128.111 Dec 3 19:58:22 legacy sshd[2425]: Failed password for invalid user jesica from 2.224.128.111 port 51599 ssh2 Dec 3 20:04:27 legacy sshd[2691]: Failed password for backup from 2.224.128.111 port 61546 ssh2 ... |
2019-12-04 03:07:38 |
| 42.200.106.20 | attackbots | Web app attack attempt |
2019-12-04 03:13:38 |