City: San Antonio
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
104.144.30.170 | attackbots | (From whitlow.retha@gmail.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com |
2020-07-24 23:10:58 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.3.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.144.3.97. IN A
;; AUTHORITY SECTION:
. 586 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052300 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 24 01:30:14 CST 2022
;; MSG SIZE rcvd: 105
Host 97.3.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 97.3.144.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
52.148.202.239 | attackspam | 2020-07-15T10:33:46.702081vps773228.ovh.net sshd[20303]: Invalid user admin from 52.148.202.239 port 19532 2020-07-15T10:33:46.718949vps773228.ovh.net sshd[20303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.148.202.239 2020-07-15T10:33:46.702081vps773228.ovh.net sshd[20303]: Invalid user admin from 52.148.202.239 port 19532 2020-07-15T10:33:48.745866vps773228.ovh.net sshd[20303]: Failed password for invalid user admin from 52.148.202.239 port 19532 ssh2 2020-07-15T12:44:16.301909vps773228.ovh.net sshd[21890]: Invalid user admin from 52.148.202.239 port 7235 ... |
2020-07-15 18:53:26 |
138.255.220.7 | attack | Automatic report - Banned IP Access |
2020-07-15 18:49:54 |
222.186.30.112 | attack | Jul 15 12:38:35 home sshd[1658]: Failed password for root from 222.186.30.112 port 60662 ssh2 Jul 15 12:38:44 home sshd[1674]: Failed password for root from 222.186.30.112 port 19090 ssh2 Jul 15 12:38:47 home sshd[1674]: Failed password for root from 222.186.30.112 port 19090 ssh2 ... |
2020-07-15 18:57:22 |
177.91.79.21 | attackspambots | Jul 15 12:11:09 piServer sshd[24674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.91.79.21 Jul 15 12:11:11 piServer sshd[24674]: Failed password for invalid user cftp from 177.91.79.21 port 53942 ssh2 Jul 15 12:16:26 piServer sshd[25140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.91.79.21 ... |
2020-07-15 18:55:58 |
52.191.248.156 | attackbotsspam | Lines containing failures of 52.191.248.156 Jul 14 23:19:54 nexus sshd[21531]: Invalid user admin from 52.191.248.156 port 40125 Jul 14 23:19:54 nexus sshd[21531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.191.248.156 Jul 14 23:19:54 nexus sshd[21532]: Invalid user admin from 52.191.248.156 port 40142 Jul 14 23:19:54 nexus sshd[21532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.191.248.156 Jul 14 23:19:56 nexus sshd[21531]: Failed password for invalid user admin from 52.191.248.156 port 40125 ssh2 Jul 14 23:19:56 nexus sshd[21532]: Failed password for invalid user admin from 52.191.248.156 port 40142 ssh2 Jul 14 23:19:56 nexus sshd[21531]: Received disconnect from 52.191.248.156 port 40125:11: Client disconnecting normally [preauth] Jul 14 23:19:56 nexus sshd[21531]: Disconnected from 52.191.248.156 port 40125 [preauth] Jul 14 23:19:56 nexus sshd[21532]: Received disconnect f........ ------------------------------ |
2020-07-15 19:10:06 |
161.35.236.116 | attackspam | Jul 15 12:16:26 debian-2gb-nbg1-2 kernel: \[17066751.787842\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=161.35.236.116 DST=195.201.40.59 LEN=424 TOS=0x00 PREC=0x00 TTL=47 ID=52750 DF PROTO=UDP SPT=49220 DPT=4500 LEN=404 |
2020-07-15 18:50:26 |
223.207.247.225 | attack | Unauthorized connection attempt from IP address 223.207.247.225 on Port 445(SMB) |
2020-07-15 19:13:19 |
218.94.136.90 | attackbotsspam | Jul 15 12:16:00 ArkNodeAT sshd\[946\]: Invalid user superman from 218.94.136.90 Jul 15 12:16:00 ArkNodeAT sshd\[946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90 Jul 15 12:16:02 ArkNodeAT sshd\[946\]: Failed password for invalid user superman from 218.94.136.90 port 14358 ssh2 |
2020-07-15 19:21:17 |
46.238.122.54 | attackspambots | Jul 15 10:21:21 IngegnereFirenze sshd[26939]: Failed password for invalid user phoenix from 46.238.122.54 port 61390 ssh2 ... |
2020-07-15 19:25:40 |
141.136.73.80 | attack | Unauthorized connection attempt from IP address 141.136.73.80 on Port 445(SMB) |
2020-07-15 19:03:21 |
101.227.82.219 | attackspam | Jul 15 12:10:24 server sshd[12766]: Failed password for invalid user monkey from 101.227.82.219 port 33665 ssh2 Jul 15 12:13:25 server sshd[21898]: Failed password for invalid user yue from 101.227.82.219 port 54045 ssh2 Jul 15 12:16:19 server sshd[29942]: Failed password for invalid user ddd from 101.227.82.219 port 9910 ssh2 |
2020-07-15 19:04:12 |
165.227.225.195 | attackspam | Brute-force attempt banned |
2020-07-15 18:57:54 |
5.135.165.51 | attackbots | Jul 15 13:16:50 rancher-0 sshd[336016]: Invalid user student from 5.135.165.51 port 52460 ... |
2020-07-15 19:23:34 |
114.31.9.194 | attackspam | Unauthorized connection attempt from IP address 114.31.9.194 on Port 445(SMB) |
2020-07-15 19:00:20 |
40.115.242.24 | attackspam | Jul 15 21:06:23 localhost sshd[2885824]: Invalid user admin from 40.115.242.24 port 4822 ... |
2020-07-15 19:15:41 |