城市(city): unknown
省份(region): unknown
国家(country): Kazakhstan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.57.53.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;95.57.53.46. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:35:15 CST 2025
;; MSG SIZE rcvd: 104
46.53.57.95.in-addr.arpa domain name pointer 95.57.53.46.dynamic.telecom.kz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
46.53.57.95.in-addr.arpa name = 95.57.53.46.dynamic.telecom.kz.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.172.220.69 | attackbotsspam | 0,33-01/01 [bc01/m66] PostRequest-Spammer scoring: zurich |
2020-08-06 02:40:37 |
| 91.134.240.130 | attackspambots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-05T12:22:20Z and 2020-08-05T12:34:13Z |
2020-08-06 02:39:56 |
| 69.10.39.227 | attackspambots | Received obvious spam mail with links to malicious servers. |
2020-08-06 02:10:35 |
| 194.181.66.137 | attackspam | (sshd) Failed SSH login from 194.181.66.137 (PL/Poland/-): 5 in the last 3600 secs |
2020-08-06 02:32:15 |
| 176.123.10.71 | attackspambots | Aug 5 20:02:25 debian-2gb-nbg1-2 kernel: \[18909005.665921\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.123.10.71 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=42462 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-08-06 02:21:10 |
| 209.85.167.65 | normal | sending fraudulent emails: Hallo, ich bin Omar Ali, ich bin Banker hier in Dubai. Ich habe Sie bezüglich eines Kontos eines Staatsbürgers Ihres Landes kontaktiert. Dieser Mann starb vor 12 Jahren und erwähnte niemanden, der sein bei unserer Bank hinterlegtes Geld geerbt hatte. Die Bank erlaubte mir, den nächsten Verwandten mit einem verstorbenen Kunden zu finden, aber ich fand ihn nicht. Dieses Konto wird beschlagnahmt, wenn niemand erklärt, dass das Bankkonto der nächste Angehörige ist. Ich habe mich daher entschlossen, Sie zum gegenseitigen Nutzen zu kontaktieren. Ich warte auf Ihre Antwort für weitere Details. Respektvoll, Omar Ali |
2020-08-06 02:29:05 |
| 186.4.222.45 | attackbots | Aug 5 18:20:40 inter-technics sshd[24045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.222.45 user=root Aug 5 18:20:42 inter-technics sshd[24045]: Failed password for root from 186.4.222.45 port 48668 ssh2 Aug 5 18:25:14 inter-technics sshd[24362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.222.45 user=root Aug 5 18:25:16 inter-technics sshd[24362]: Failed password for root from 186.4.222.45 port 58946 ssh2 Aug 5 18:29:41 inter-technics sshd[24562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.222.45 user=root Aug 5 18:29:43 inter-technics sshd[24562]: Failed password for root from 186.4.222.45 port 41010 ssh2 ... |
2020-08-06 02:44:48 |
| 186.234.249.196 | attack | 2020-08-05T18:55:42.084401snf-827550 sshd[9922]: Failed password for root from 186.234.249.196 port 17329 ssh2 2020-08-05T19:00:25.557456snf-827550 sshd[9981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.234.249.196 user=root 2020-08-05T19:00:27.474885snf-827550 sshd[9981]: Failed password for root from 186.234.249.196 port 50995 ssh2 ... |
2020-08-06 02:13:44 |
| 167.99.12.47 | attackbots | 167.99.12.47 - - \[05/Aug/2020:17:46:37 +0200\] "POST /wp-login.php HTTP/1.0" 200 5674 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 167.99.12.47 - - \[05/Aug/2020:17:46:38 +0200\] "POST /wp-login.php HTTP/1.0" 200 5474 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 167.99.12.47 - - \[05/Aug/2020:17:46:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 5490 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-08-06 02:28:48 |
| 112.85.42.187 | attack | 2020-08-05T14:06:31.117993uwu-server sshd[3602275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.187 user=root 2020-08-05T14:06:33.049855uwu-server sshd[3602275]: Failed password for root from 112.85.42.187 port 26560 ssh2 2020-08-05T14:06:31.117993uwu-server sshd[3602275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.187 user=root 2020-08-05T14:06:33.049855uwu-server sshd[3602275]: Failed password for root from 112.85.42.187 port 26560 ssh2 2020-08-05T14:06:37.346599uwu-server sshd[3602275]: Failed password for root from 112.85.42.187 port 26560 ssh2 ... |
2020-08-06 02:21:29 |
| 60.167.239.99 | attackspambots | Aug 5 05:11:06 dignus sshd[20859]: Failed password for root from 60.167.239.99 port 42422 ssh2 Aug 5 05:12:04 dignus sshd[20955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.239.99 user=root Aug 5 05:12:06 dignus sshd[20955]: Failed password for root from 60.167.239.99 port 48526 ssh2 Aug 5 05:13:13 dignus sshd[21087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.239.99 user=root Aug 5 05:13:15 dignus sshd[21087]: Failed password for root from 60.167.239.99 port 54628 ssh2 ... |
2020-08-06 02:41:00 |
| 45.77.249.229 | attack | Aug 5 03:08:48 web1 sshd\[7768\]: Invalid user 1818 from 45.77.249.229 Aug 5 03:08:48 web1 sshd\[7768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.249.229 Aug 5 03:08:50 web1 sshd\[7768\]: Failed password for invalid user 1818 from 45.77.249.229 port 45381 ssh2 Aug 5 03:11:52 web1 sshd\[8041\]: Invalid user 181818 from 45.77.249.229 Aug 5 03:11:52 web1 sshd\[8041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.249.229 |
2020-08-06 02:11:59 |
| 113.194.68.202 | attackbotsspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-08-06 02:31:06 |
| 1.173.71.194 | attackbots | 20/8/5@08:14:04: FAIL: Alarm-Network address from=1.173.71.194 ... |
2020-08-06 02:12:30 |
| 104.248.237.70 | attackbotsspam | Aug 5 15:56:56 ns381471 sshd[15077]: Failed password for root from 104.248.237.70 port 16284 ssh2 |
2020-08-06 02:26:13 |