City: unknown
Region: unknown
Country: Serbia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.93.104.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.93.104.145. IN A
;; AUTHORITY SECTION:
. 530 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:59:56 CST 2022
;; MSG SIZE rcvd: 107
145.104.93.109.in-addr.arpa domain name pointer 109-93-104-145.static.isp.telekom.rs.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.104.93.109.in-addr.arpa name = 109-93-104-145.static.isp.telekom.rs.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.241.249.19 | attack | Sep 29 18:21:44 php1 sshd\[29448\]: Invalid user ncs from 192.241.249.19 Sep 29 18:21:44 php1 sshd\[29448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=picasso.logoworks.com Sep 29 18:21:47 php1 sshd\[29448\]: Failed password for invalid user ncs from 192.241.249.19 port 40904 ssh2 Sep 29 18:26:32 php1 sshd\[30032\]: Invalid user user from 192.241.249.19 Sep 29 18:26:32 php1 sshd\[30032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=picasso.logoworks.com |
2019-09-30 20:13:43 |
5.62.159.195 | attackspambots | local de/Mac/boat yard -find inside the house/5.62.159.195/hostname admins/domain admins mostly local pervs /death threats from google.com/api/reCAPTCHA/net recaptcha many versions added posting |
2019-09-30 20:51:22 |
67.184.64.224 | attack | Sep 30 02:19:28 kapalua sshd\[19338\]: Invalid user oradev from 67.184.64.224 Sep 30 02:19:28 kapalua sshd\[19338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-67-184-64-224.hsd1.il.comcast.net Sep 30 02:19:31 kapalua sshd\[19338\]: Failed password for invalid user oradev from 67.184.64.224 port 21210 ssh2 Sep 30 02:23:13 kapalua sshd\[19685\]: Invalid user external from 67.184.64.224 Sep 30 02:23:13 kapalua sshd\[19685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-67-184-64-224.hsd1.il.comcast.net |
2019-09-30 20:30:21 |
95.182.79.41 | attackspam | $f2bV_matches |
2019-09-30 20:17:57 |
148.72.208.74 | attack | Sep 30 08:13:30 ny01 sshd[9889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.208.74 Sep 30 08:13:33 ny01 sshd[9889]: Failed password for invalid user teste from 148.72.208.74 port 40550 ssh2 Sep 30 08:17:57 ny01 sshd[10729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.208.74 |
2019-09-30 20:24:11 |
176.58.193.239 | attackbots | $f2bV_matches |
2019-09-30 20:41:58 |
52.192.249.155 | attack | Sep 29 20:36:14 hanapaa sshd\[17628\]: Invalid user xq from 52.192.249.155 Sep 29 20:36:14 hanapaa sshd\[17628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-192-249-155.ap-northeast-1.compute.amazonaws.com Sep 29 20:36:16 hanapaa sshd\[17628\]: Failed password for invalid user xq from 52.192.249.155 port 44295 ssh2 Sep 29 20:40:37 hanapaa sshd\[18132\]: Invalid user alberg from 52.192.249.155 Sep 29 20:40:37 hanapaa sshd\[18132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-192-249-155.ap-northeast-1.compute.amazonaws.com |
2019-09-30 20:16:11 |
85.235.67.67 | attackspambots | Sep 30 11:36:01 icinga sshd[29927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.235.67.67 Sep 30 11:36:03 icinga sshd[29927]: Failed password for invalid user linux from 85.235.67.67 port 42912 ssh2 ... |
2019-09-30 20:12:38 |
222.186.180.19 | attackbotsspam | $f2bV_matches |
2019-09-30 20:47:22 |
36.236.36.200 | attackspambots | Port scan |
2019-09-30 20:09:38 |
222.186.180.17 | attackbots | Sep 30 14:41:32 arianus sshd\[28667\]: Unable to negotiate with 222.186.180.17 port 23994: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ... |
2019-09-30 20:49:20 |
217.138.76.66 | attackspam | Sep 30 13:55:43 vps01 sshd[10986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.76.66 Sep 30 13:55:45 vps01 sshd[10986]: Failed password for invalid user assise from 217.138.76.66 port 60059 ssh2 |
2019-09-30 20:10:12 |
187.109.10.100 | attackspambots | Sep 30 14:17:20 MK-Soft-Root1 sshd[18725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100 Sep 30 14:17:22 MK-Soft-Root1 sshd[18725]: Failed password for invalid user jd from 187.109.10.100 port 46180 ssh2 ... |
2019-09-30 20:52:48 |
200.76.101.157 | attackspambots | Unauthorised access (Sep 30) SRC=200.76.101.157 LEN=52 TOS=0x08 PREC=0x40 TTL=107 ID=8455 DF TCP DPT=445 WINDOW=8192 SYN |
2019-09-30 20:17:30 |
177.144.242.214 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/177.144.242.214/ BR - 1H : (1004) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN27699 IP : 177.144.242.214 CIDR : 177.144.192.0/18 PREFIX COUNT : 267 UNIQUE IP COUNT : 6569728 WYKRYTE ATAKI Z ASN27699 : 1H - 5 3H - 15 6H - 23 12H - 45 24H - 70 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-09-30 20:11:37 |