City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.94.50.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.94.50.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 17:18:11 CST 2025
;; MSG SIZE rcvd: 105
Host 50.50.94.130.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.50.94.130.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.138.99.8 | attackspam | 37215/tcp [2020-08-22]1pkt |
2020-08-23 06:17:23 |
| 128.199.128.215 | attackspam | prod6 ... |
2020-08-23 06:36:16 |
| 192.241.154.168 | attack | Aug 22 22:41:53 localhost sshd\[20616\]: Invalid user file from 192.241.154.168 port 36936 Aug 22 22:41:53 localhost sshd\[20616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.168 Aug 22 22:41:55 localhost sshd\[20616\]: Failed password for invalid user file from 192.241.154.168 port 36936 ssh2 ... |
2020-08-23 06:45:36 |
| 156.96.107.223 | attackspam | Jul 28 18:05:29 *hidden* postfix/postscreen[10560]: DNSBL rank 4 for [156.96.107.223]:53478 |
2020-08-23 06:24:46 |
| 119.45.151.125 | attack | SSH Invalid Login |
2020-08-23 06:42:14 |
| 123.207.153.52 | attackbotsspam | Invalid user npf from 123.207.153.52 port 56236 |
2020-08-23 06:44:47 |
| 196.179.253.33 | attack | Unauthorized connection attempt from IP address 196.179.253.33 on Port 445(SMB) |
2020-08-23 06:45:21 |
| 104.248.1.92 | attack | Aug 21 06:44:37 *hidden* sshd[8101]: Failed password for invalid user glassfish from 104.248.1.92 port 58522 ssh2 Aug 21 06:51:23 *hidden* sshd[9387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.92 user=root Aug 21 06:51:26 *hidden* sshd[9387]: Failed password for *hidden* from 104.248.1.92 port 45368 ssh2 |
2020-08-23 06:20:48 |
| 216.218.240.46 | attack | Dovecot Invalid User Login Attempt. |
2020-08-23 06:17:57 |
| 1.202.77.210 | attackbotsspam | 2020-08-22T17:24:36.4180291495-001 sshd[9000]: Invalid user test from 1.202.77.210 port 19140 2020-08-22T17:24:38.6117961495-001 sshd[9000]: Failed password for invalid user test from 1.202.77.210 port 19140 ssh2 2020-08-22T17:28:14.8268371495-001 sshd[9240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.77.210 user=root 2020-08-22T17:28:16.9470231495-001 sshd[9240]: Failed password for root from 1.202.77.210 port 12944 ssh2 2020-08-22T17:31:48.1219341495-001 sshd[9435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.77.210 user=root 2020-08-22T17:31:49.6192081495-001 sshd[9435]: Failed password for root from 1.202.77.210 port 6742 ssh2 ... |
2020-08-23 06:42:46 |
| 188.131.179.87 | attack | Aug 22 22:53:21 cosmoit sshd[26177]: Failed password for root from 188.131.179.87 port 62788 ssh2 |
2020-08-23 06:11:06 |
| 142.93.172.45 | attackbotsspam | 142.93.172.45 - - [22/Aug/2020:23:33:17 +0200] "GET /wp-login.php HTTP/1.1" 200 1748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.172.45 - - [22/Aug/2020:23:33:20 +0200] "POST /wp-login.php HTTP/1.1" 200 1880 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.172.45 - - [22/Aug/2020:23:33:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.172.45 - - [22/Aug/2020:23:33:22 +0200] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.172.45 - - [22/Aug/2020:23:33:24 +0200] "GET /wp-login.php HTTP/1.1" 200 1748 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.172.45 - - [22/Aug/2020:23:33:25 +0200] "POST /wp-login.php HTTP/1.1" 200 1855 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir ... |
2020-08-23 06:25:45 |
| 123.6.51.133 | attack | 2020-08-22T17:24:40.0763581495-001 sshd[9002]: Failed password for ftp from 123.6.51.133 port 59564 ssh2 2020-08-22T17:29:00.4209411495-001 sshd[9284]: Invalid user ddd from 123.6.51.133 port 36230 2020-08-22T17:29:00.4240171495-001 sshd[9284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.6.51.133 2020-08-22T17:29:00.4209411495-001 sshd[9284]: Invalid user ddd from 123.6.51.133 port 36230 2020-08-22T17:29:02.8601491495-001 sshd[9284]: Failed password for invalid user ddd from 123.6.51.133 port 36230 ssh2 2020-08-22T17:33:26.4628601495-001 sshd[9523]: Invalid user mine from 123.6.51.133 port 41126 ... |
2020-08-23 06:22:02 |
| 218.92.0.168 | attackspam | Aug 22 22:39:47 localhost sshd\[20571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Aug 22 22:39:49 localhost sshd\[20571\]: Failed password for root from 218.92.0.168 port 17349 ssh2 Aug 22 22:39:53 localhost sshd\[20571\]: Failed password for root from 218.92.0.168 port 17349 ssh2 ... |
2020-08-23 06:40:41 |
| 94.102.51.17 | attackbotsspam | Fail2Ban Ban Triggered |
2020-08-23 06:37:22 |