城市(city): Uchaly
省份(region): Bashkortostan Republic
国家(country): Russia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.75.14.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38488
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.75.14.194. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091100 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 12 00:52:04 CST 2019
;; MSG SIZE rcvd: 116
194.14.75.94.in-addr.arpa domain name pointer h94-75-14-194.dyn.bashtel.ru.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
194.14.75.94.in-addr.arpa name = h94-75-14-194.dyn.bashtel.ru.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
104.248.149.206 | attackbotsspam | Aug 18 10:52:24 *hidden* sshd[10329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.206 Aug 18 10:52:27 *hidden* sshd[10329]: Failed password for invalid user mc3 from 104.248.149.206 port 43999 ssh2 Aug 18 11:04:39 *hidden* sshd[12496]: Invalid user nodejs from 104.248.149.206 port 64195 |
2020-08-19 21:36:24 |
103.70.199.125 | attackbots | Unauthorized connection attempt from IP address 103.70.199.125 on Port 445(SMB) |
2020-08-19 21:54:39 |
218.92.0.216 | attack | 2020-08-19T16:40:48.099812lavrinenko.info sshd[14770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216 user=root 2020-08-19T16:40:49.678445lavrinenko.info sshd[14770]: Failed password for root from 218.92.0.216 port 15835 ssh2 2020-08-19T16:40:48.099812lavrinenko.info sshd[14770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.216 user=root 2020-08-19T16:40:49.678445lavrinenko.info sshd[14770]: Failed password for root from 218.92.0.216 port 15835 ssh2 2020-08-19T16:40:53.437161lavrinenko.info sshd[14770]: Failed password for root from 218.92.0.216 port 15835 ssh2 ... |
2020-08-19 21:45:21 |
150.158.120.81 | attack | Aug 19 14:29:48 dev0-dcde-rnet sshd[30644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.120.81 Aug 19 14:29:50 dev0-dcde-rnet sshd[30644]: Failed password for invalid user ubb from 150.158.120.81 port 35518 ssh2 Aug 19 14:33:58 dev0-dcde-rnet sshd[30707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.158.120.81 |
2020-08-19 22:17:05 |
171.35.176.32 | attackspambots | Port Scan detected! ... |
2020-08-19 22:18:20 |
139.59.17.238 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-08-19 22:16:07 |
94.49.66.134 | attackbotsspam | Unauthorized connection attempt from IP address 94.49.66.134 on Port 445(SMB) |
2020-08-19 21:52:27 |
2a01:4f8:201:62f5::2 | attackspam | 20 attempts against mh-misbehave-ban on stem |
2020-08-19 22:19:43 |
118.24.2.141 | attack | Aug 19 16:11:07 pkdns2 sshd\[27296\]: Invalid user weaver from 118.24.2.141Aug 19 16:11:09 pkdns2 sshd\[27296\]: Failed password for invalid user weaver from 118.24.2.141 port 45422 ssh2Aug 19 16:15:02 pkdns2 sshd\[27412\]: Invalid user admin from 118.24.2.141Aug 19 16:15:03 pkdns2 sshd\[27412\]: Failed password for invalid user admin from 118.24.2.141 port 55006 ssh2Aug 19 16:19:00 pkdns2 sshd\[27593\]: Invalid user www from 118.24.2.141Aug 19 16:19:02 pkdns2 sshd\[27593\]: Failed password for invalid user www from 118.24.2.141 port 36364 ssh2 ... |
2020-08-19 22:19:02 |
123.206.190.82 | attackspambots | Aug 19 14:29:51 ns382633 sshd\[3059\]: Invalid user jenkins from 123.206.190.82 port 41842 Aug 19 14:29:51 ns382633 sshd\[3059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82 Aug 19 14:29:53 ns382633 sshd\[3059\]: Failed password for invalid user jenkins from 123.206.190.82 port 41842 ssh2 Aug 19 14:31:15 ns382633 sshd\[3664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.190.82 user=root Aug 19 14:31:17 ns382633 sshd\[3664\]: Failed password for root from 123.206.190.82 port 54372 ssh2 |
2020-08-19 21:56:12 |
49.233.166.113 | attackspambots | 2020-08-19T12:58:05.975273shield sshd\[32758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.166.113 user=root 2020-08-19T12:58:08.367089shield sshd\[32758\]: Failed password for root from 49.233.166.113 port 50500 ssh2 2020-08-19T13:03:17.966374shield sshd\[768\]: Invalid user mysql from 49.233.166.113 port 49636 2020-08-19T13:03:17.987283shield sshd\[768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.166.113 2020-08-19T13:03:19.541430shield sshd\[768\]: Failed password for invalid user mysql from 49.233.166.113 port 49636 ssh2 |
2020-08-19 21:36:45 |
185.234.217.164 | attackspambots | Aug 19 15:18:35 srv01 postfix/smtpd\[22058\]: warning: unknown\[185.234.217.164\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 15:23:32 srv01 postfix/smtpd\[12870\]: warning: unknown\[185.234.217.164\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 15:24:44 srv01 postfix/smtpd\[26384\]: warning: unknown\[185.234.217.164\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 15:25:34 srv01 postfix/smtpd\[23258\]: warning: unknown\[185.234.217.164\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 15:32:04 srv01 postfix/smtpd\[29899\]: warning: unknown\[185.234.217.164\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-19 21:51:59 |
106.12.13.185 | attack | 2020-08-19T16:33:27.569152afi-git.jinr.ru sshd[24761]: Invalid user yar from 106.12.13.185 port 56370 2020-08-19T16:33:27.572446afi-git.jinr.ru sshd[24761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.185 2020-08-19T16:33:27.569152afi-git.jinr.ru sshd[24761]: Invalid user yar from 106.12.13.185 port 56370 2020-08-19T16:33:29.276464afi-git.jinr.ru sshd[24761]: Failed password for invalid user yar from 106.12.13.185 port 56370 ssh2 2020-08-19T16:34:07.161904afi-git.jinr.ru sshd[24911]: Invalid user ubuntu from 106.12.13.185 port 60980 ... |
2020-08-19 22:09:25 |
45.163.144.2 | attackbotsspam | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-08-19 22:12:46 |
222.186.175.215 | attackspam | Aug 19 15:36:41 srv-ubuntu-dev3 sshd[38172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root Aug 19 15:36:43 srv-ubuntu-dev3 sshd[38172]: Failed password for root from 222.186.175.215 port 44832 ssh2 Aug 19 15:36:47 srv-ubuntu-dev3 sshd[38172]: Failed password for root from 222.186.175.215 port 44832 ssh2 Aug 19 15:36:41 srv-ubuntu-dev3 sshd[38172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root Aug 19 15:36:43 srv-ubuntu-dev3 sshd[38172]: Failed password for root from 222.186.175.215 port 44832 ssh2 Aug 19 15:36:47 srv-ubuntu-dev3 sshd[38172]: Failed password for root from 222.186.175.215 port 44832 ssh2 Aug 19 15:36:41 srv-ubuntu-dev3 sshd[38172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root Aug 19 15:36:43 srv-ubuntu-dev3 sshd[38172]: Failed password for root from 222.186.175.215 p ... |
2020-08-19 21:38:42 |