City: Ufa
Region: Bashkortostan Republic
Country: Russia
Internet Service Provider: OJSC Ufanet
Hostname: unknown
Organization: OJSC Ufanet
Usage Type: Fixed Line ISP
Type | Details | Datetime |
---|---|---|
attackspam | Aug 28 08:03:34 tdfoods sshd\[21635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.41.202.248.dynamic.ufanet.ru user=root Aug 28 08:03:36 tdfoods sshd\[21635\]: Failed password for root from 94.41.202.248 port 36261 ssh2 Aug 28 08:08:28 tdfoods sshd\[22038\]: Invalid user ftpuser from 94.41.202.248 Aug 28 08:08:28 tdfoods sshd\[22038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.41.202.248.dynamic.ufanet.ru Aug 28 08:08:30 tdfoods sshd\[22038\]: Failed password for invalid user ftpuser from 94.41.202.248 port 58888 ssh2 |
2019-08-29 02:11:30 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.41.202.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60250
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.41.202.248. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082801 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 29 02:11:23 CST 2019
;; MSG SIZE rcvd: 117
248.202.41.94.in-addr.arpa domain name pointer 94.41.202.248.dynamic.ufanet.ru.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
248.202.41.94.in-addr.arpa name = 94.41.202.248.dynamic.ufanet.ru.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
41.242.106.6 | attack | $f2bV_matches |
2020-03-29 01:21:01 |
2.229.42.47 | attackspambots | Port scan on 1 port(s): 5555 |
2020-03-29 01:28:04 |
66.249.64.29 | attackbotsspam | Automatic report - Banned IP Access |
2020-03-29 00:53:30 |
51.83.212.145 | attackbots | [portscan] Port scan |
2020-03-29 01:21:30 |
45.55.6.42 | attack | $f2bV_matches |
2020-03-29 01:23:31 |
91.233.42.38 | attackspambots | Mar 28 13:19:07 ny01 sshd[16035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.233.42.38 Mar 28 13:19:09 ny01 sshd[16035]: Failed password for invalid user xiaoming from 91.233.42.38 port 54566 ssh2 Mar 28 13:24:24 ny01 sshd[18146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.233.42.38 |
2020-03-29 01:28:46 |
222.129.134.225 | attackspam | Invalid user fom from 222.129.134.225 port 40993 |
2020-03-29 01:43:24 |
123.56.96.153 | attackbots | 28.03.2020 15:18:34 Recursive DNS scan |
2020-03-29 01:20:28 |
112.197.2.114 | attackbots | Mar 28 16:47:49 dev0-dcde-rnet sshd[3351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.197.2.114 Mar 28 16:47:51 dev0-dcde-rnet sshd[3351]: Failed password for invalid user ipx from 112.197.2.114 port 59706 ssh2 Mar 28 17:01:17 dev0-dcde-rnet sshd[3629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.197.2.114 |
2020-03-29 01:11:36 |
50.70.229.239 | attackspambots | Too many connections or unauthorized access detected from Arctic banned ip |
2020-03-29 01:02:18 |
51.75.67.69 | attackspam | Mar 28 17:57:33 vps sshd[466181]: Failed password for invalid user emil from 51.75.67.69 port 60270 ssh2 Mar 28 18:02:03 vps sshd[494880]: Invalid user cur from 51.75.67.69 port 44654 Mar 28 18:02:03 vps sshd[494880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-75-67.eu Mar 28 18:02:05 vps sshd[494880]: Failed password for invalid user cur from 51.75.67.69 port 44654 ssh2 Mar 28 18:06:20 vps sshd[520894]: Invalid user grey from 51.75.67.69 port 57270 ... |
2020-03-29 01:38:24 |
165.22.208.25 | attackspam | Mar 28 16:09:51 XXX sshd[65180]: Invalid user support from 165.22.208.25 port 37586 |
2020-03-29 01:05:18 |
182.75.139.26 | attackbots | Mar 28 16:58:04 Invalid user twm from 182.75.139.26 port 56759 |
2020-03-29 00:58:08 |
200.105.74.139 | attack | Mar 28 14:02:19 vmd48417 sshd[13529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.74.139 |
2020-03-29 01:04:49 |
179.110.9.113 | attackspam | port scan and connect, tcp 80 (http) |
2020-03-29 01:33:07 |