City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.157.70.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.157.70.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 01:43:55 CST 2025
;; MSG SIZE rcvd: 107
Host 142.70.157.136.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.70.157.136.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.141.166.197 | attackspambots | DATE:2020-05-06 18:31:12, IP:113.141.166.197, PORT:ssh SSH brute force auth (docker-dc) |
2020-05-07 01:07:49 |
| 103.114.221.16 | attackspambots | May 6 13:52:51 ns382633 sshd\[15467\]: Invalid user ftp_user from 103.114.221.16 port 43100 May 6 13:52:51 ns382633 sshd\[15467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.221.16 May 6 13:52:54 ns382633 sshd\[15467\]: Failed password for invalid user ftp_user from 103.114.221.16 port 43100 ssh2 May 6 13:59:31 ns382633 sshd\[16574\]: Invalid user claudio from 103.114.221.16 port 52462 May 6 13:59:31 ns382633 sshd\[16574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.221.16 |
2020-05-07 00:41:30 |
| 92.118.160.21 | attackspam | srv02 Mass scanning activity detected Target: 82 .. |
2020-05-07 01:08:10 |
| 104.168.28.195 | attackbots | 2020-05-06T05:59:27.240055linuxbox-skyline sshd[213354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.28.195 user=root 2020-05-06T05:59:29.409059linuxbox-skyline sshd[213354]: Failed password for root from 104.168.28.195 port 50715 ssh2 ... |
2020-05-07 00:43:50 |
| 106.12.221.77 | attack | May 6 11:59:26 marvibiene sshd[39757]: Invalid user mongo from 106.12.221.77 port 51444 May 6 11:59:26 marvibiene sshd[39757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.77 May 6 11:59:26 marvibiene sshd[39757]: Invalid user mongo from 106.12.221.77 port 51444 May 6 11:59:28 marvibiene sshd[39757]: Failed password for invalid user mongo from 106.12.221.77 port 51444 ssh2 ... |
2020-05-07 00:45:02 |
| 217.55.13.32 | attackspam | 1588766372 - 05/06/2020 13:59:32 Host: 217.55.13.32/217.55.13.32 Port: 445 TCP Blocked |
2020-05-07 00:33:47 |
| 182.151.27.122 | attackspambots | May 6 17:48:20 buvik sshd[28444]: Invalid user delgado from 182.151.27.122 May 6 17:48:20 buvik sshd[28444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.27.122 May 6 17:48:22 buvik sshd[28444]: Failed password for invalid user delgado from 182.151.27.122 port 48496 ssh2 ... |
2020-05-07 00:53:10 |
| 51.91.251.20 | attackbots | May 5 04:16:26 pi sshd[11608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.251.20 May 5 04:16:28 pi sshd[11608]: Failed password for invalid user dip from 51.91.251.20 port 38964 ssh2 |
2020-05-07 01:02:28 |
| 13.92.228.224 | attackspambots | May 6 04:01:46 onepixel sshd[1732575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.92.228.224 May 6 04:01:48 onepixel sshd[1732575]: Failed password for invalid user george from 13.92.228.224 port 60350 ssh2 May 6 04:10:39 onepixel sshd[1753976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.92.228.224 ... |
2020-05-07 00:48:24 |
| 49.234.27.90 | attackbots | " " |
2020-05-07 00:56:10 |
| 111.42.102.79 | attackspam | User agent spoofing, Connecting to IP instead of domain name, Page: /HNAP1/ |
2020-05-07 01:14:37 |
| 129.226.68.190 | attackspam | May 6 15:15:27 vps333114 sshd[4226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.68.190 May 6 15:15:30 vps333114 sshd[4226]: Failed password for invalid user netadmin from 129.226.68.190 port 48904 ssh2 ... |
2020-05-07 00:46:24 |
| 185.244.212.62 | attackspambots | Fail2Ban Ban Triggered |
2020-05-07 01:05:28 |
| 182.61.49.107 | attackbotsspam | May 6 01:50:54 web9 sshd\[23382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107 user=root May 6 01:50:55 web9 sshd\[23382\]: Failed password for root from 182.61.49.107 port 34546 ssh2 May 6 01:54:44 web9 sshd\[23865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107 user=root May 6 01:54:46 web9 sshd\[23865\]: Failed password for root from 182.61.49.107 port 53298 ssh2 May 6 01:59:03 web9 sshd\[24431\]: Invalid user rtorrent from 182.61.49.107 May 6 01:59:03 web9 sshd\[24431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107 |
2020-05-07 01:08:38 |
| 118.116.8.215 | attackbotsspam | May 6 10:38:38 server1 sshd\[29370\]: Invalid user william from 118.116.8.215 May 6 10:38:38 server1 sshd\[29370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.116.8.215 May 6 10:38:40 server1 sshd\[29370\]: Failed password for invalid user william from 118.116.8.215 port 48320 ssh2 May 6 10:41:32 server1 sshd\[30409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.116.8.215 user=root May 6 10:41:34 server1 sshd\[30409\]: Failed password for root from 118.116.8.215 port 33441 ssh2 ... |
2020-05-07 00:55:56 |