城市(city): Ufa
省份(region): Bashkortostan
国家(country): Russia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.41.40.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.41.40.242. IN A
;; AUTHORITY SECTION:
. 254 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023060602 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 07 13:35:49 CST 2023
;; MSG SIZE rcvd: 105
242.40.41.94.in-addr.arpa domain name pointer 94.41.40.242.dynamic.ufanet.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.40.41.94.in-addr.arpa name = 94.41.40.242.dynamic.ufanet.ru.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.152.4.30 | attackbots | Sent mail to target address hacked/leaked from abandonia in 2016 |
2019-09-13 21:31:30 |
| 37.142.43.168 | attack | Sep 13 14:27:38 markkoudstaal sshd[17911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.142.43.168 Sep 13 14:27:40 markkoudstaal sshd[17911]: Failed password for invalid user 210 from 37.142.43.168 port 36360 ssh2 Sep 13 14:32:46 markkoudstaal sshd[18375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.142.43.168 |
2019-09-13 20:53:28 |
| 103.207.11.12 | attackbots | Sep 13 13:51:15 localhost sshd\[85750\]: Invalid user minecraft from 103.207.11.12 port 50860 Sep 13 13:51:15 localhost sshd\[85750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12 Sep 13 13:51:17 localhost sshd\[85750\]: Failed password for invalid user minecraft from 103.207.11.12 port 50860 ssh2 Sep 13 13:55:55 localhost sshd\[85870\]: Invalid user servers from 103.207.11.12 port 37416 Sep 13 13:55:55 localhost sshd\[85870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12 ... |
2019-09-13 21:59:56 |
| 41.193.64.55 | attackbotsspam | Automatic report - Port Scan Attack |
2019-09-13 21:13:00 |
| 118.24.38.53 | attack | Sep 13 03:06:56 eddieflores sshd\[29973\]: Invalid user daniel from 118.24.38.53 Sep 13 03:06:56 eddieflores sshd\[29973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.53 Sep 13 03:06:58 eddieflores sshd\[29973\]: Failed password for invalid user daniel from 118.24.38.53 port 36992 ssh2 Sep 13 03:11:09 eddieflores sshd\[30385\]: Invalid user sinusbot123 from 118.24.38.53 Sep 13 03:11:09 eddieflores sshd\[30385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.53 |
2019-09-13 21:18:44 |
| 178.128.54.223 | attackbotsspam | Sep 13 03:18:53 php2 sshd\[7943\]: Invalid user postgres from 178.128.54.223 Sep 13 03:18:53 php2 sshd\[7943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223 Sep 13 03:18:55 php2 sshd\[7943\]: Failed password for invalid user postgres from 178.128.54.223 port 12617 ssh2 Sep 13 03:27:42 php2 sshd\[8682\]: Invalid user userftp from 178.128.54.223 Sep 13 03:27:42 php2 sshd\[8682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223 |
2019-09-13 21:29:50 |
| 203.234.19.83 | attack | 2019-09-13T14:22:52.871290 sshd[18613]: Invalid user jenkins from 203.234.19.83 port 33792 2019-09-13T14:22:52.886849 sshd[18613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.234.19.83 2019-09-13T14:22:52.871290 sshd[18613]: Invalid user jenkins from 203.234.19.83 port 33792 2019-09-13T14:22:55.151691 sshd[18613]: Failed password for invalid user jenkins from 203.234.19.83 port 33792 ssh2 2019-09-13T14:28:37.907927 sshd[18685]: Invalid user user from 203.234.19.83 port 48202 ... |
2019-09-13 21:00:10 |
| 27.54.183.116 | attackbots | Unauthorized connection attempt from IP address 27.54.183.116 on Port 445(SMB) |
2019-09-13 20:58:12 |
| 193.32.163.182 | attackspambots | Sep 13 15:39:01 bouncer sshd\[17445\]: Invalid user admin from 193.32.163.182 port 46473 Sep 13 15:39:01 bouncer sshd\[17445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 Sep 13 15:39:02 bouncer sshd\[17445\]: Failed password for invalid user admin from 193.32.163.182 port 46473 ssh2 ... |
2019-09-13 21:42:53 |
| 148.66.142.135 | attack | Sep 13 03:32:25 web9 sshd\[26243\]: Invalid user 123 from 148.66.142.135 Sep 13 03:32:25 web9 sshd\[26243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.142.135 Sep 13 03:32:27 web9 sshd\[26243\]: Failed password for invalid user 123 from 148.66.142.135 port 38158 ssh2 Sep 13 03:37:36 web9 sshd\[27699\]: Invalid user radio123 from 148.66.142.135 Sep 13 03:37:36 web9 sshd\[27699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.142.135 |
2019-09-13 21:45:33 |
| 52.15.212.3 | attackspam | WordPress wp-login brute force :: 52.15.212.3 0.048 BYPASS [13/Sep/2019:21:18:41 1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4634 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36" |
2019-09-13 21:48:07 |
| 196.53.224.184 | attackbotsspam | " " |
2019-09-13 21:16:39 |
| 112.85.42.186 | attack | Sep 13 19:22:49 areeb-Workstation sshd[15687]: Failed password for root from 112.85.42.186 port 34372 ssh2 ... |
2019-09-13 21:58:12 |
| 171.246.247.61 | attackspambots | Unauthorized connection attempt from IP address 171.246.247.61 on Port 445(SMB) |
2019-09-13 21:57:08 |
| 123.12.239.238 | attack | Sep 13 13:18:45 km20725 sshd[25603]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [123.12.239.238] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 13 13:18:45 km20725 sshd[25603]: Invalid user admin from 123.12.239.238 Sep 13 13:18:45 km20725 sshd[25603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.12.239.238 Sep 13 13:18:48 km20725 sshd[25603]: Failed password for invalid user admin from 123.12.239.238 port 55142 ssh2 Sep 13 13:18:50 km20725 sshd[25603]: Failed password for invalid user admin from 123.12.239.238 port 55142 ssh2 Sep 13 13:18:52 km20725 sshd[25603]: Failed password for invalid user admin from 123.12.239.238 port 55142 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.12.239.238 |
2019-09-13 21:27:13 |