City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.207.255.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.207.255.13. IN A
;; AUTHORITY SECTION:
. 492 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:10:55 CST 2022
;; MSG SIZE rcvd: 107
13.255.207.104.in-addr.arpa domain name pointer senkadatea.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.255.207.104.in-addr.arpa name = senkadatea.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
13.88.219.189 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-09-15 14:35:10 |
91.121.176.34 | attack | Sep 14 19:42:32 hpm sshd\[31556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34 user=root Sep 14 19:42:34 hpm sshd\[31556\]: Failed password for root from 91.121.176.34 port 42216 ssh2 Sep 14 19:46:16 hpm sshd\[31825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34 user=root Sep 14 19:46:18 hpm sshd\[31825\]: Failed password for root from 91.121.176.34 port 53882 ssh2 Sep 14 19:50:11 hpm sshd\[32118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34 user=root |
2020-09-15 14:36:33 |
167.172.98.198 | attackbotsspam | Sep 15 08:43:20 abendstille sshd\[11708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198 user=root Sep 15 08:43:22 abendstille sshd\[11708\]: Failed password for root from 167.172.98.198 port 59850 ssh2 Sep 15 08:47:08 abendstille sshd\[16582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198 user=root Sep 15 08:47:10 abendstille sshd\[16582\]: Failed password for root from 167.172.98.198 port 43206 ssh2 Sep 15 08:50:55 abendstille sshd\[20442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.198 user=root ... |
2020-09-15 14:58:40 |
181.121.134.55 | attackspambots | detected by Fail2Ban |
2020-09-15 14:44:14 |
91.132.147.168 | attack | (sshd) Failed SSH login from 91.132.147.168 (DE/Germany/netcupDE.tor-exit.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 01:40:32 optimus sshd[6713]: Failed password for root from 91.132.147.168 port 65059 ssh2 Sep 15 01:40:35 optimus sshd[6713]: Failed password for root from 91.132.147.168 port 65059 ssh2 Sep 15 01:40:37 optimus sshd[6713]: Failed password for root from 91.132.147.168 port 65059 ssh2 Sep 15 01:40:40 optimus sshd[6713]: Failed password for root from 91.132.147.168 port 65059 ssh2 Sep 15 01:40:42 optimus sshd[6713]: Failed password for root from 91.132.147.168 port 65059 ssh2 |
2020-09-15 14:50:54 |
156.54.122.60 | attackspam | Sep 15 05:11:03 IngegnereFirenze sshd[706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.122.60 user=root ... |
2020-09-15 14:44:33 |
5.190.144.84 | attackspambots | Sep 14 18:49:18 mail.srvfarm.net postfix/smtps/smtpd[2079488]: warning: unknown[5.190.144.84]: SASL PLAIN authentication failed: Sep 14 18:49:18 mail.srvfarm.net postfix/smtps/smtpd[2079488]: lost connection after AUTH from unknown[5.190.144.84] Sep 14 18:49:51 mail.srvfarm.net postfix/smtpd[2076884]: warning: unknown[5.190.144.84]: SASL PLAIN authentication failed: Sep 14 18:49:52 mail.srvfarm.net postfix/smtpd[2076884]: lost connection after AUTH from unknown[5.190.144.84] Sep 14 18:50:47 mail.srvfarm.net postfix/smtpd[2078261]: warning: unknown[5.190.144.84]: SASL PLAIN authentication failed: |
2020-09-15 15:07:16 |
45.160.138.182 | attackbotsspam | Sep 14 18:54:56 mail.srvfarm.net postfix/smtpd[2076883]: warning: unknown[45.160.138.182]: SASL PLAIN authentication failed: Sep 14 18:54:57 mail.srvfarm.net postfix/smtpd[2076883]: lost connection after AUTH from unknown[45.160.138.182] Sep 14 18:56:18 mail.srvfarm.net postfix/smtpd[2076883]: warning: unknown[45.160.138.182]: SASL PLAIN authentication failed: Sep 14 18:56:18 mail.srvfarm.net postfix/smtpd[2076883]: lost connection after AUTH from unknown[45.160.138.182] Sep 14 18:57:07 mail.srvfarm.net postfix/smtps/smtpd[2079600]: warning: unknown[45.160.138.182]: SASL PLAIN authentication failed: |
2020-09-15 15:05:16 |
202.52.253.82 | attackspam | Sep 15 07:50:31 mail.srvfarm.net postfix/smtpd[2536035]: warning: unknown[202.52.253.82]: SASL PLAIN authentication failed: Sep 15 07:50:32 mail.srvfarm.net postfix/smtpd[2536035]: lost connection after AUTH from unknown[202.52.253.82] Sep 15 07:50:46 mail.srvfarm.net postfix/smtpd[2536029]: warning: unknown[202.52.253.82]: SASL PLAIN authentication failed: Sep 15 07:50:47 mail.srvfarm.net postfix/smtpd[2536029]: lost connection after AUTH from unknown[202.52.253.82] Sep 15 07:59:43 mail.srvfarm.net postfix/smtpd[2542126]: warning: unknown[202.52.253.82]: SASL PLAIN authentication failed: |
2020-09-15 14:52:51 |
177.38.5.108 | attackbotsspam | Sep 14 18:52:49 mail.srvfarm.net postfix/smtps/smtpd[2075184]: warning: unknown[177.38.5.108]: SASL PLAIN authentication failed: Sep 14 18:52:49 mail.srvfarm.net postfix/smtps/smtpd[2075184]: lost connection after AUTH from unknown[177.38.5.108] Sep 14 18:54:54 mail.srvfarm.net postfix/smtps/smtpd[2075766]: warning: unknown[177.38.5.108]: SASL PLAIN authentication failed: Sep 14 18:54:55 mail.srvfarm.net postfix/smtps/smtpd[2075766]: lost connection after AUTH from unknown[177.38.5.108] Sep 14 18:55:10 mail.srvfarm.net postfix/smtps/smtpd[2077859]: warning: unknown[177.38.5.108]: SASL PLAIN authentication failed: |
2020-09-15 14:57:14 |
51.178.169.200 | attackspambots | Sep 15 08:24:38 ip106 sshd[28621]: Failed password for root from 51.178.169.200 port 47924 ssh2 Sep 15 08:30:50 ip106 sshd[28811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.169.200 ... |
2020-09-15 14:45:55 |
152.89.216.33 | attack | $f2bV_matches |
2020-09-15 14:34:50 |
157.245.200.68 | attackspambots | $f2bV_matches |
2020-09-15 14:38:08 |
201.55.179.153 | attackbotsspam | Sep 14 18:21:29 mail.srvfarm.net postfix/smtpd[2073940]: warning: 201-55-179-153.witelecom.com.br[201.55.179.153]: SASL PLAIN authentication failed: Sep 14 18:21:30 mail.srvfarm.net postfix/smtpd[2073940]: lost connection after AUTH from 201-55-179-153.witelecom.com.br[201.55.179.153] Sep 14 18:22:36 mail.srvfarm.net postfix/smtps/smtpd[2073845]: warning: 201-55-179-153.witelecom.com.br[201.55.179.153]: SASL PLAIN authentication failed: Sep 14 18:22:36 mail.srvfarm.net postfix/smtps/smtpd[2073845]: lost connection after AUTH from 201-55-179-153.witelecom.com.br[201.55.179.153] Sep 14 18:28:27 mail.srvfarm.net postfix/smtpd[2073940]: warning: 201-55-179-153.witelecom.com.br[201.55.179.153]: SASL PLAIN authentication failed: |
2020-09-15 15:09:55 |
185.220.101.8 | attackspambots | $f2bV_matches |
2020-09-15 14:37:45 |