City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 0.0.0.193 | attackspam | Fail2Ban Ban Triggered |
2020-02-21 00:19:57 |
| 0.0.0.4 | attack | chaangnoi.com 2a00:ab00:203:b::4 \[03/Nov/2019:06:51:34 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 445 "-" "WordPress/4.5.15\; https://evparg.ru" chaangnoifulda.de 2a00:ab00:203:b::4 \[03/Nov/2019:06:51:34 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4248 "-" "WordPress/4.5.15\; https://evparg.ru" |
2019-11-03 17:30:14 |
| 0.0.0.32 | attackspam | www.goldgier.de 2a06:dd00:1:4::32 \[29/Oct/2019:04:48:45 +0100\] "POST /wp-login.php HTTP/1.1" 200 6202 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.goldgier.de 2a06:dd00:1:4::32 \[29/Oct/2019:04:48:46 +0100\] "POST /wp-login.php HTTP/1.1" 200 6197 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-29 17:30:23 |
| 0.0.0.27 | attackbots | abcdata-sys.de:80 2a02:4780:1:8::27 - - \[28/Oct/2019:12:51:29 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "WordPress/4.7.11\; http://claudiaservicios.online" www.goldgier.de 2a02:4780:1:8::27 \[28/Oct/2019:12:51:29 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4484 "-" "WordPress/4.7.11\; http://claudiaservicios.online" |
2019-10-28 23:02:28 |
| 0.0.0.22 | attackspambots | abasicmove.de 2a00:d680:10:50::22 \[18/Oct/2019:21:53:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 5761 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" abasicmove.de 2a00:d680:10:50::22 \[18/Oct/2019:21:53:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 5560 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-19 04:14:06 |
| 0.0.0.44 | attackbotsspam | www.ft-1848-basketball.de 2a00:d0c0:200:0:b9:1a:9c:44 \[18/Oct/2019:13:33:16 +0200\] "POST /wp-login.php HTTP/1.1" 200 2172 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.ft-1848-basketball.de 2a00:d0c0:200:0:b9:1a:9c:44 \[18/Oct/2019:13:33:16 +0200\] "POST /wp-login.php HTTP/1.1" 200 2143 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-19 03:04:17 |
| 0.0.0.81 | attackbots | pfaffenroth-photographie.de 2404:f080:1101:320:150:95:108:81 \[11/Sep/2019:09:56:08 +0200\] "POST /wp-login.php HTTP/1.1" 200 6694 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" pfaffenroth-photographie.de 2404:f080:1101:320:150:95:108:81 \[11/Sep/2019:09:56:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 6705 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-09-11 18:10:42 |
| 0.0.0.67 | attackbots | miraniessen.de 2a02:408:7722:1:77:222:62:67 \[09/Sep/2019:06:38:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 5972 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" miraniessen.de 2a02:408:7722:1:77:222:62:67 \[09/Sep/2019:06:38:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 5976 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-09-09 15:36:08 |
| 0.0.0.63 | attack | masters-of-media.de 2404:f080:1101:318:150:95:105:63 \[09/Sep/2019:06:39:08 +0200\] "POST /wp-login.php HTTP/1.1" 200 5855 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" masters-of-media.de 2404:f080:1101:318:150:95:105:63 \[09/Sep/2019:06:39:10 +0200\] "POST /wp-login.php HTTP/1.1" 200 5854 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-09-09 14:57:40 |
| 0.0.0.77 | attackbotsspam | masters-of-media.de 2a06:dd00:1:4:1::77 \[21/Jun/2019:06:36:25 +0200\] "POST /wp-login.php HTTP/1.1" 200 5856 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" masters-of-media.de 2a06:dd00:1:4:1::77 \[21/Jun/2019:06:36:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 5811 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-06-21 17:19:17 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.0.0.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;0.0.0.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092201 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 23 09:24:27 CST 2025
;; MSG SIZE rcvd: 101
Host 42.0.0.0.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.0.0.0.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.92.0.163 | attack | Nov 12 17:51:10 v22019058497090703 sshd[11002]: Failed password for root from 218.92.0.163 port 27716 ssh2 Nov 12 17:51:21 v22019058497090703 sshd[11002]: Failed password for root from 218.92.0.163 port 27716 ssh2 Nov 12 17:51:25 v22019058497090703 sshd[11002]: Failed password for root from 218.92.0.163 port 27716 ssh2 Nov 12 17:51:25 v22019058497090703 sshd[11002]: error: maximum authentication attempts exceeded for root from 218.92.0.163 port 27716 ssh2 [preauth] ... |
2019-11-13 01:13:41 |
| 209.17.96.138 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-13 01:11:26 |
| 222.186.175.148 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148 user=root Failed password for root from 222.186.175.148 port 42644 ssh2 Failed password for root from 222.186.175.148 port 42644 ssh2 Failed password for root from 222.186.175.148 port 42644 ssh2 Failed password for root from 222.186.175.148 port 42644 ssh2 |
2019-11-13 00:59:59 |
| 65.182.104.116 | attackbotsspam | RDP Bruteforce |
2019-11-13 01:19:29 |
| 222.186.42.4 | attackspam | Nov 12 18:06:52 dedicated sshd[29424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Nov 12 18:06:54 dedicated sshd[29424]: Failed password for root from 222.186.42.4 port 11034 ssh2 |
2019-11-13 01:11:07 |
| 123.13.15.114 | attackbots | 19/11/12@09:42:14: FAIL: IoT-Telnet address from=123.13.15.114 ... |
2019-11-13 01:08:25 |
| 62.234.67.252 | attackbots | Automatic report - Banned IP Access |
2019-11-13 01:12:59 |
| 144.91.86.133 | attack | Nov 12 15:40:00 nextcloud sshd\[10107\]: Invalid user test from 144.91.86.133 Nov 12 15:40:00 nextcloud sshd\[10107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.86.133 Nov 12 15:40:02 nextcloud sshd\[10107\]: Failed password for invalid user test from 144.91.86.133 port 34730 ssh2 ... |
2019-11-13 00:37:41 |
| 84.196.70.84 | attackspambots | 2019-11-12T14:39:38.206529abusebot-2.cloudsearch.cf sshd\[27822\]: Invalid user mysql from 84.196.70.84 port 60720 |
2019-11-13 00:57:19 |
| 194.61.26.34 | attackspambots | $f2bV_matches |
2019-11-13 01:00:39 |
| 54.37.8.91 | attack | SSH brutforce |
2019-11-13 01:20:01 |
| 178.46.214.37 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-13 01:05:22 |
| 223.241.247.214 | attackspam | Nov 12 13:12:05 vtv3 sshd\[4178\]: Invalid user nunes from 223.241.247.214 port 34152 Nov 12 13:12:05 vtv3 sshd\[4178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214 Nov 12 13:12:07 vtv3 sshd\[4178\]: Failed password for invalid user nunes from 223.241.247.214 port 34152 ssh2 Nov 12 13:21:59 vtv3 sshd\[9348\]: Invalid user kalynn from 223.241.247.214 port 42144 Nov 12 13:21:59 vtv3 sshd\[9348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214 Nov 12 13:36:13 vtv3 sshd\[16462\]: Invalid user pz from 223.241.247.214 port 39993 Nov 12 13:36:13 vtv3 sshd\[16462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.241.247.214 Nov 12 13:36:15 vtv3 sshd\[16462\]: Failed password for invalid user pz from 223.241.247.214 port 39993 ssh2 Nov 12 13:40:38 vtv3 sshd\[18665\]: Invalid user zhouh from 223.241.247.214 port 58084 Nov 12 13:40:38 vtv3 sshd\[18665\ |
2019-11-13 00:48:04 |
| 5.188.210.47 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-11-13 01:08:58 |
| 37.49.231.143 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-13 00:36:47 |