City: unknown
Region: unknown
Country: United States of America
Internet Service Provider: QuadraNet Enterprises LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | May 21 23:58:48 server1 sshd\[19050\]: Invalid user fuy from 104.129.5.143 May 21 23:58:48 server1 sshd\[19050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.143 May 21 23:58:50 server1 sshd\[19050\]: Failed password for invalid user fuy from 104.129.5.143 port 57486 ssh2 May 22 00:04:38 server1 sshd\[20863\]: Invalid user ncs from 104.129.5.143 May 22 00:04:38 server1 sshd\[20863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.143 ... |
2020-05-22 19:29:57 |
attackbots | Apr 30 18:16:08 gw1 sshd[12331]: Failed password for root from 104.129.5.143 port 49538 ssh2 ... |
2020-04-30 22:09:32 |
IP | Type | Details | Datetime |
---|---|---|---|
104.129.5.49 | attackspambots | SSH login attempts. |
2020-06-21 15:14:41 |
104.129.5.49 | attackbots | Jun 18 10:07:44 our-server-hostname sshd[22531]: Address 104.129.5.49 maps to 104.129.5.49.static.quadranet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 18 10:07:44 our-server-hostname sshd[22531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.49 user=r.r Jun 18 10:07:46 our-server-hostname sshd[22531]: Failed password for r.r from 104.129.5.49 port 56645 ssh2 Jun 18 10:24:08 our-server-hostname sshd[26662]: Address 104.129.5.49 maps to 104.129.5.49.static.quadranet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 18 10:24:08 our-server-hostname sshd[26662]: Invalid user hy from 104.129.5.49 Jun 18 10:24:08 our-server-hostname sshd[26662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.49 Jun 18 10:24:11 our-server-hostname sshd[26662]: Failed password for invalid user hy from 104.129.5.49 port 46546 s........ ------------------------------- |
2020-06-21 00:38:43 |
104.129.5.49 | attackbots | prod8 ... |
2020-06-19 14:13:56 |
104.129.53.195 | attackbotsspam | WordPress XMLRPC scan :: 104.129.53.195 0.136 BYPASS [15/Oct/2019:14:45:48 1100] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/7.2.14" |
2019-10-15 18:06:24 |
104.129.58.240 | attackspam | NAME : QUADRANET-ATLANTA CIDR : 104.129.24.0/23 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Georgia - block certain countries :) IP: 104.129.58.240 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-22 21:01:48 |
104.129.58.202 | attackbots | NAME : QUADRANET-ATLANTA CIDR : 104.129.24.0/23 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Georgia - block certain countries :) IP: 104.129.58.202 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-22 06:34:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.5.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.129.5.143. IN A
;; AUTHORITY SECTION:
. 565 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020043000 1800 900 604800 86400
;; Query time: 303 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 22:09:26 CST 2020
;; MSG SIZE rcvd: 117
143.5.129.104.in-addr.arpa domain name pointer 104.129.5.143.static.quadranet.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
143.5.129.104.in-addr.arpa name = 104.129.5.143.static.quadranet.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
187.234.80.118 | attackspam | Automatic report - Port Scan Attack |
2019-11-06 21:03:55 |
154.125.92.16 | attack | Nov 6 00:04:53 finn sshd[31697]: Invalid user btftp from 154.125.92.16 port 59386 Nov 6 00:04:53 finn sshd[31697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.125.92.16 Nov 6 00:04:55 finn sshd[31697]: Failed password for invalid user btftp from 154.125.92.16 port 59386 ssh2 Nov 6 00:04:55 finn sshd[31697]: Received disconnect from 154.125.92.16 port 59386:11: Bye Bye [preauth] Nov 6 00:04:55 finn sshd[31697]: Disconnected from 154.125.92.16 port 59386 [preauth] Nov 6 00:13:05 finn sshd[1259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.125.92.16 user=r.r Nov 6 00:13:06 finn sshd[1259]: Failed password for r.r from 154.125.92.16 port 33077 ssh2 Nov 6 00:13:07 finn sshd[1259]: Received disconnect from 154.125.92.16 port 33077:11: Bye Bye [preauth] Nov 6 00:13:07 finn sshd[1259]: Disconnected from 154.125.92.16 port 33077 [preauth] ........ ----------------------------------------------- https://www.block |
2019-11-06 20:30:22 |
167.99.173.171 | attack | SSH Brute-Force attacks |
2019-11-06 20:35:31 |
134.209.173.240 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 20:49:49 |
213.87.126.109 | attack | Chat Spam |
2019-11-06 20:51:47 |
212.47.251.164 | attack | detected by Fail2Ban |
2019-11-06 20:44:36 |
37.120.152.186 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 20:23:45 |
183.136.213.97 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 20:59:09 |
159.203.201.250 | attackspambots | 159.203.201.250 was recorded 5 times by 5 hosts attempting to connect to the following ports: 8983,39584. Incident counter (4h, 24h, all-time): 5, 6, 14 |
2019-11-06 20:40:50 |
159.203.7.104 | attackbots | Nov 6 07:22:00 nextcloud sshd\[19035\]: Invalid user jin from 159.203.7.104 Nov 6 07:22:00 nextcloud sshd\[19035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.7.104 Nov 6 07:22:02 nextcloud sshd\[19035\]: Failed password for invalid user jin from 159.203.7.104 port 34632 ssh2 ... |
2019-11-06 21:01:59 |
134.209.39.104 | attackspambots | 8x Failed Password |
2019-11-06 20:47:56 |
104.200.134.150 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 20:26:24 |
79.137.217.226 | attackspambots | [portscan] Port scan |
2019-11-06 20:33:16 |
165.22.58.247 | attack | Nov 6 09:59:43 markkoudstaal sshd[17833]: Failed password for root from 165.22.58.247 port 39960 ssh2 Nov 6 10:04:21 markkoudstaal sshd[18207]: Failed password for root from 165.22.58.247 port 52232 ssh2 |
2019-11-06 20:50:09 |
45.141.84.28 | attack | Nov 6 10:52:08 TCP Attack: SRC=45.141.84.28 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=244 PROTO=TCP SPT=58385 DPT=3278 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-11-06 20:37:46 |