City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.149.1.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.149.1.49. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031401 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 05:05:49 CST 2025
;; MSG SIZE rcvd: 105
Host 49.1.149.136.in-addr.arpa not found: 2(SERVFAIL)
server can't find 136.149.1.49.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 151.80.234.255 | attack | 2020-05-04T20:22:14.642258dmca.cloudsearch.cf sshd[1053]: Invalid user san from 151.80.234.255 port 37974 2020-05-04T20:22:14.648982dmca.cloudsearch.cf sshd[1053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-151-80-234.eu 2020-05-04T20:22:14.642258dmca.cloudsearch.cf sshd[1053]: Invalid user san from 151.80.234.255 port 37974 2020-05-04T20:22:16.461460dmca.cloudsearch.cf sshd[1053]: Failed password for invalid user san from 151.80.234.255 port 37974 ssh2 2020-05-04T20:25:39.612957dmca.cloudsearch.cf sshd[1326]: Invalid user ts3bot from 151.80.234.255 port 49782 2020-05-04T20:25:39.618384dmca.cloudsearch.cf sshd[1326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-151-80-234.eu 2020-05-04T20:25:39.612957dmca.cloudsearch.cf sshd[1326]: Invalid user ts3bot from 151.80.234.255 port 49782 2020-05-04T20:25:41.572303dmca.cloudsearch.cf sshd[1326]: Failed password for invalid user ts3bot from 15 ... |
2020-05-05 06:11:26 |
| 80.64.80.56 | attackbotsspam | SSH brute-force: detected 15 distinct usernames within a 24-hour window. |
2020-05-05 06:19:32 |
| 157.230.132.100 | attack | 2020-05-05T00:03:09.422229 sshd[20282]: Invalid user joanne from 157.230.132.100 port 46232 2020-05-05T00:03:09.436610 sshd[20282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.132.100 2020-05-05T00:03:09.422229 sshd[20282]: Invalid user joanne from 157.230.132.100 port 46232 2020-05-05T00:03:11.491935 sshd[20282]: Failed password for invalid user joanne from 157.230.132.100 port 46232 ssh2 ... |
2020-05-05 06:11:04 |
| 181.196.151.82 | attackspambots | Automatic report - Banned IP Access |
2020-05-05 06:05:38 |
| 129.158.114.213 | attackspam | SSH Invalid Login |
2020-05-05 05:58:40 |
| 160.16.82.31 | attackspam | May 4 23:43:09 debian-2gb-nbg1-2 kernel: \[10887487.230235\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=160.16.82.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=12341 PROTO=TCP SPT=42501 DPT=475 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-05 05:53:22 |
| 116.118.2.3 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-05-05 06:03:53 |
| 83.36.48.61 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-05-05 06:10:29 |
| 202.142.168.58 | attackbotsspam | Automatic report - Windows Brute-Force Attack |
2020-05-05 06:19:53 |
| 156.251.164.54 | attack | prod3 ... |
2020-05-05 06:25:09 |
| 149.56.142.47 | attackspambots | SSH Invalid Login |
2020-05-05 05:56:40 |
| 124.204.65.82 | attack | May 4 22:57:27 legacy sshd[6069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.65.82 May 4 22:57:29 legacy sshd[6069]: Failed password for invalid user user from 124.204.65.82 port 19415 ssh2 May 4 23:02:15 legacy sshd[6240]: Failed password for root from 124.204.65.82 port 5398 ssh2 ... |
2020-05-05 06:22:14 |
| 45.82.137.35 | attackbots | May 5 00:27:09 ift sshd\[37483\]: Invalid user a0 from 45.82.137.35May 5 00:27:11 ift sshd\[37483\]: Failed password for invalid user a0 from 45.82.137.35 port 40582 ssh2May 5 00:29:30 ift sshd\[37785\]: Invalid user bopp from 45.82.137.35May 5 00:29:32 ift sshd\[37785\]: Failed password for invalid user bopp from 45.82.137.35 port 48382 ssh2May 5 00:31:47 ift sshd\[38239\]: Invalid user bless from 45.82.137.35 ... |
2020-05-05 05:52:27 |
| 118.89.61.51 | attack | May 4 22:08:30 ns382633 sshd\[10719\]: Invalid user admin from 118.89.61.51 port 60620 May 4 22:08:30 ns382633 sshd\[10719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.61.51 May 4 22:08:32 ns382633 sshd\[10719\]: Failed password for invalid user admin from 118.89.61.51 port 60620 ssh2 May 4 22:25:32 ns382633 sshd\[14669\]: Invalid user tea from 118.89.61.51 port 52944 May 4 22:25:32 ns382633 sshd\[14669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.61.51 |
2020-05-05 06:18:23 |
| 170.231.59.49 | attack | SSH Invalid Login |
2020-05-05 06:28:53 |