City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.16.209.86 | spam | AGAIN and AGAIN and ALWAYS the same REGISTRAR as 1api.net TO STOP IMMEDIATELY for keeping SPAMMERS, LIERS, ROBERS and else since too many years ! The cheapest service, as usual... Dossier transmis aux autorités Européennes et Françaises pour CONDAMNATION à 750 € par POURRIEL émis les SOUS MERDES, OK ? From: Joka |
2020-03-19 05:04:59 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.2.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.16.2.121. IN A
;; AUTHORITY SECTION:
. 494 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052100 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 21 17:58:42 CST 2022
;; MSG SIZE rcvd: 105
Host 121.2.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 121.2.16.104.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.40.123.74 | attackbotsspam | lfd: (smtpauth) Failed SMTP AUTH login from 89.40.123.74 (host74-123-40-89.serverdedicati.aruba.it): 5 in the last 3600 secs - Sat Jun 9 10:16:24 2018 |
2020-04-30 17:36:00 |
| 106.13.184.7 | attackspam | Invalid user srd from 106.13.184.7 port 34338 |
2020-04-30 17:38:21 |
| 222.191.176.163 | attackbots | lfd: (smtpauth) Failed SMTP AUTH login from 222.191.176.163 (-): 5 in the last 3600 secs - Sun Jun 10 01:57:40 2018 |
2020-04-30 17:37:52 |
| 140.238.15.139 | attack | <6 unauthorized SSH connections |
2020-04-30 17:33:04 |
| 61.140.232.154 | attackspam | Brute force blocker - service: proftpd1 - aantal: 120 - Tue Jun 12 04:20:16 2018 |
2020-04-30 17:11:49 |
| 49.82.182.204 | attack | Brute force blocker - service: proftpd1 - aantal: 38 - Sun Jun 10 21:30:16 2018 |
2020-04-30 17:27:50 |
| 54.191.214.10 | attack | RDP Brute-Force (honeypot 9) |
2020-04-30 17:37:23 |
| 149.56.172.224 | attackbotsspam | Apr 30 05:16:26 hcbbdb sshd\[2333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip224.ip-149-56-172.net user=root Apr 30 05:16:28 hcbbdb sshd\[2333\]: Failed password for root from 149.56.172.224 port 37918 ssh2 Apr 30 05:19:21 hcbbdb sshd\[2627\]: Invalid user matt from 149.56.172.224 Apr 30 05:19:21 hcbbdb sshd\[2627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip224.ip-149-56-172.net Apr 30 05:19:22 hcbbdb sshd\[2627\]: Failed password for invalid user matt from 149.56.172.224 port 57092 ssh2 |
2020-04-30 17:24:32 |
| 149.56.12.88 | attackspam | fail2ban -- 149.56.12.88 ... |
2020-04-30 17:16:20 |
| 117.91.60.229 | attackbotsspam | Brute force blocker - service: proftpd1 - aantal: 66 - Mon Jun 11 18:20:16 2018 |
2020-04-30 17:12:38 |
| 190.144.125.66 | attackbots | Lines containing failures of 190.144.125.66 Apr 30 01:57:10 shared01 sshd[3796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.125.66 user=r.r Apr 30 01:57:12 shared01 sshd[3796]: Failed password for r.r from 190.144.125.66 port 53560 ssh2 Apr 30 01:57:12 shared01 sshd[3796]: Received disconnect from 190.144.125.66 port 53560:11: Bye Bye [preauth] Apr 30 01:57:12 shared01 sshd[3796]: Disconnected from authenticating user r.r 190.144.125.66 port 53560 [preauth] Apr 30 02:18:26 shared01 sshd[11093]: Invalid user programacion from 190.144.125.66 port 53266 Apr 30 02:18:26 shared01 sshd[11093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.125.66 Apr 30 02:18:28 shared01 sshd[11093]: Failed password for invalid user programacion from 190.144.125.66 port 53266 ssh2 Apr 30 02:18:28 shared01 sshd[11093]: Received disconnect from 190.144.125.66 port 53266:11: Bye Bye [preauth] Ap........ ------------------------------ |
2020-04-30 17:47:27 |
| 218.92.0.148 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-04-30 17:25:45 |
| 114.202.139.173 | attackbotsspam | 2020-04-30T05:05:26.698023shield sshd\[32445\]: Invalid user look from 114.202.139.173 port 36312 2020-04-30T05:05:26.702668shield sshd\[32445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.202.139.173 2020-04-30T05:05:29.007966shield sshd\[32445\]: Failed password for invalid user look from 114.202.139.173 port 36312 ssh2 2020-04-30T05:07:47.063216shield sshd\[350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.202.139.173 user=root 2020-04-30T05:07:49.062728shield sshd\[350\]: Failed password for root from 114.202.139.173 port 58152 ssh2 |
2020-04-30 17:25:11 |
| 123.206.59.235 | attack | 2020-04-30T10:50:42.122516amanda2.illicoweb.com sshd\[8248\]: Invalid user schedule from 123.206.59.235 port 40872 2020-04-30T10:50:42.128435amanda2.illicoweb.com sshd\[8248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.59.235 2020-04-30T10:50:44.281931amanda2.illicoweb.com sshd\[8248\]: Failed password for invalid user schedule from 123.206.59.235 port 40872 ssh2 2020-04-30T10:54:55.415754amanda2.illicoweb.com sshd\[8595\]: Invalid user naufal from 123.206.59.235 port 42056 2020-04-30T10:54:55.418035amanda2.illicoweb.com sshd\[8595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.59.235 ... |
2020-04-30 17:28:58 |
| 222.85.247.47 | attackspam | Brute force blocker - service: proftpd1 - aantal: 77 - Tue Jun 12 04:30:16 2018 |
2020-04-30 17:09:44 |