City: Amsterdam
Region: North Holland
Country: Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: Microsoft Corporation
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 13.80.25.251 | attackspam | Rude login attack (5 tries in 1d) |
2019-09-24 03:09:58 |
| 13.80.242.163 | attackbots | Fail2Ban Ban Triggered |
2019-08-21 07:08:29 |
| 13.80.242.163 | attackbots | DATE:2019-07-26 01:09:10, IP:13.80.242.163, PORT:ssh brute force auth on SSH service (patata) |
2019-07-26 08:19:47 |
| 13.80.249.12 | attackspambots | Jul 25 20:18:24 meumeu sshd[15901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.249.12 Jul 25 20:18:26 meumeu sshd[15901]: Failed password for invalid user jakarta from 13.80.249.12 port 34891 ssh2 Jul 25 20:23:26 meumeu sshd[14663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.249.12 ... |
2019-07-26 02:25:32 |
| 13.80.242.163 | attackbots | Jul 25 12:45:22 MK-Soft-VM3 sshd\[11614\]: Invalid user postgres from 13.80.242.163 port 53986 Jul 25 12:45:22 MK-Soft-VM3 sshd\[11614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.242.163 Jul 25 12:45:24 MK-Soft-VM3 sshd\[11614\]: Failed password for invalid user postgres from 13.80.242.163 port 53986 ssh2 ... |
2019-07-25 20:45:49 |
| 13.80.242.163 | attackspam | Jul 25 17:34:14 vibhu-HP-Z238-Microtower-Workstation sshd\[12308\]: Invalid user hadoop from 13.80.242.163 Jul 25 17:34:14 vibhu-HP-Z238-Microtower-Workstation sshd\[12308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.242.163 Jul 25 17:34:16 vibhu-HP-Z238-Microtower-Workstation sshd\[12308\]: Failed password for invalid user hadoop from 13.80.242.163 port 41476 ssh2 Jul 25 17:39:34 vibhu-HP-Z238-Microtower-Workstation sshd\[12695\]: Invalid user udin from 13.80.242.163 Jul 25 17:39:34 vibhu-HP-Z238-Microtower-Workstation sshd\[12695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.242.163 ... |
2019-07-25 20:18:26 |
| 13.80.249.12 | attack | Jul 25 04:44:28 meumeu sshd[13063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.249.12 Jul 25 04:44:30 meumeu sshd[13063]: Failed password for invalid user op from 13.80.249.12 port 33947 ssh2 Jul 25 04:49:27 meumeu sshd[16912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.80.249.12 ... |
2019-07-25 10:53:29 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.80.2.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12957
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.80.2.37. IN A
;; AUTHORITY SECTION:
. 3208 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 21:20:57 CST 2019
;; MSG SIZE rcvd: 114
Host 37.2.80.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 37.2.80.13.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.200.245.99 | attackspambots | SSH Scan |
2019-10-29 02:13:58 |
| 80.82.77.245 | attackbotsspam | 28.10.2019 18:02:33 Connection to port 1059 blocked by firewall |
2019-10-29 02:22:10 |
| 27.16.245.255 | attack | Oct 28 15:36:35 mail sshd[7114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.16.245.255 user=r.r Oct 28 15:36:37 mail sshd[7114]: Failed password for r.r from 27.16.245.255 port 53274 ssh2 Oct 28 15:59:14 mail sshd[7446]: Invalid user admin from 27.16.245.255 Oct 28 15:59:14 mail sshd[7446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.16.245.255 Oct 28 15:59:17 mail sshd[7446]: Failed password for invalid user admin from 27.16.245.255 port 49464 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=27.16.245.255 |
2019-10-29 02:06:42 |
| 61.102.134.140 | attackbotsspam | 1433/tcp [2019-10-28]1pkt |
2019-10-29 02:03:01 |
| 195.158.81.104 | attackspam | Automatic report - Banned IP Access |
2019-10-29 02:37:36 |
| 42.118.71.117 | attack | 23/tcp [2019-10-28]1pkt |
2019-10-29 02:24:31 |
| 217.68.212.161 | attackspam | slow and persistent scanner |
2019-10-29 02:10:02 |
| 113.5.101.178 | attack | " " |
2019-10-29 02:13:14 |
| 124.66.144.114 | attackspambots | Oct 28 17:12:19 xeon sshd[58761]: Failed password for root from 124.66.144.114 port 56004 ssh2 |
2019-10-29 02:09:24 |
| 45.76.149.2 | attack | 10000/tcp [2019-10-28]1pkt |
2019-10-29 02:19:15 |
| 170.245.126.48 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-10-29 02:41:25 |
| 171.96.225.245 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-10-29 02:11:32 |
| 118.99.93.172 | attackspambots | 445/tcp [2019-10-28]1pkt |
2019-10-29 02:32:10 |
| 117.201.250.194 | attackspam | Oct 28 20:59:42 webhost01 sshd[25783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.201.250.194 Oct 28 20:59:44 webhost01 sshd[25783]: Failed password for invalid user sysop from 117.201.250.194 port 56020 ssh2 ... |
2019-10-29 02:41:08 |
| 68.145.82.154 | attackspam | 8080/tcp [2019-10-28]1pkt |
2019-10-29 02:38:39 |