City: Springfield
Region: Ohio
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.227.51.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.227.51.246. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 14:38:28 CST 2025
;; MSG SIZE rcvd: 107
246.51.227.136.in-addr.arpa domain name pointer internal.Wittenberg.EDU.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
246.51.227.136.in-addr.arpa name = internal.Wittenberg.EDU.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 84.244.180.7 | attackbots | 2019-11-09T07:24:51.247853mail01 postfix/smtpd[14724]: warning: opzetborstelshop.nl[84.244.180.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-09T07:29:03.004742mail01 postfix/smtpd[3596]: warning: opzetborstelshop.nl[84.244.180.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-09T07:29:42.470378mail01 postfix/smtpd[23279]: warning: opzetborstelshop.nl[84.244.180.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-09 14:53:35 |
| 157.245.116.131 | attackbotsspam | Nov 9 09:28:54 server sshd\[29948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.116.131 user=root Nov 9 09:28:56 server sshd\[29948\]: Failed password for root from 157.245.116.131 port 57134 ssh2 Nov 9 09:28:57 server sshd\[29958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.116.131 user=root Nov 9 09:28:59 server sshd\[29958\]: Failed password for root from 157.245.116.131 port 32900 ssh2 Nov 9 09:28:59 server sshd\[29964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.116.131 user=root ... |
2019-11-09 15:21:31 |
| 118.24.178.224 | attackbotsspam | Nov 9 06:18:19 localhost sshd\[27924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.178.224 user=root Nov 9 06:18:21 localhost sshd\[27924\]: Failed password for root from 118.24.178.224 port 46112 ssh2 Nov 9 06:23:47 localhost sshd\[28047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.178.224 user=root Nov 9 06:23:48 localhost sshd\[28047\]: Failed password for root from 118.24.178.224 port 53288 ssh2 Nov 9 06:29:50 localhost sshd\[28252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.178.224 user=root ... |
2019-11-09 14:49:44 |
| 49.88.112.116 | attackspam | Nov 9 01:56:00 ny01 sshd[2233]: Failed password for root from 49.88.112.116 port 27446 ssh2 Nov 9 01:56:03 ny01 sshd[2233]: Failed password for root from 49.88.112.116 port 27446 ssh2 Nov 9 01:56:07 ny01 sshd[2233]: Failed password for root from 49.88.112.116 port 27446 ssh2 |
2019-11-09 14:59:27 |
| 132.232.93.48 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.93.48 user=root Failed password for root from 132.232.93.48 port 37640 ssh2 Invalid user temp from 132.232.93.48 port 33724 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.93.48 Failed password for invalid user temp from 132.232.93.48 port 33724 ssh2 |
2019-11-09 14:59:05 |
| 54.38.222.82 | attackspam | Lines containing failures of 54.38.222.82 Nov 8 12:09:26 kopano sshd[27639]: Did not receive identification string from 54.38.222.82 port 60986 Nov 8 14:47:11 kopano sshd[963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.222.82 user=r.r Nov 8 14:47:13 kopano sshd[963]: Failed password for r.r from 54.38.222.82 port 43772 ssh2 Nov 8 14:47:13 kopano sshd[963]: Received disconnect from 54.38.222.82 port 43772:11: Normal Shutdown, Thank you for playing [preauth] Nov 8 14:47:13 kopano sshd[963]: Disconnected from authenticating user r.r 54.38.222.82 port 43772 [preauth] Nov 8 14:47:13 kopano sshd[965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.222.82 user=r.r Nov 8 14:47:15 kopano sshd[965]: Failed password for r.r from 54.38.222.82 port 45362 ssh2 Nov 8 14:47:15 kopano sshd[965]: Received disconnect from 54.38.222.82 port 45362:11: Normal Shutdown, Thank you for pl........ ------------------------------ |
2019-11-09 14:45:52 |
| 202.90.198.213 | attackspam | Nov 9 07:36:00 srv-ubuntu-dev3 sshd[121532]: Invalid user Studentenclub from 202.90.198.213 Nov 9 07:36:00 srv-ubuntu-dev3 sshd[121532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.90.198.213 Nov 9 07:36:00 srv-ubuntu-dev3 sshd[121532]: Invalid user Studentenclub from 202.90.198.213 Nov 9 07:36:01 srv-ubuntu-dev3 sshd[121532]: Failed password for invalid user Studentenclub from 202.90.198.213 port 40502 ssh2 Nov 9 07:40:35 srv-ubuntu-dev3 sshd[122097]: Invalid user freddie from 202.90.198.213 Nov 9 07:40:35 srv-ubuntu-dev3 sshd[122097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.90.198.213 Nov 9 07:40:35 srv-ubuntu-dev3 sshd[122097]: Invalid user freddie from 202.90.198.213 Nov 9 07:40:37 srv-ubuntu-dev3 sshd[122097]: Failed password for invalid user freddie from 202.90.198.213 port 51116 ssh2 Nov 9 07:45:14 srv-ubuntu-dev3 sshd[122422]: pam_unix(sshd:auth): authentication failure; ... |
2019-11-09 14:51:22 |
| 46.245.100.192 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/46.245.100.192/ IR - 1H : (64) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : IR NAME ASN : ASN43754 IP : 46.245.100.192 CIDR : 46.245.100.0/22 PREFIX COUNT : 183 UNIQUE IP COUNT : 163072 ATTACKS DETECTED ASN43754 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-11-09 07:30:00 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN - data recovery |
2019-11-09 14:43:30 |
| 167.71.226.158 | attack | $f2bV_matches_ltvn |
2019-11-09 15:01:32 |
| 134.209.147.198 | attackspam | Nov 9 07:29:52 zulu412 sshd\[11546\]: Invalid user chan from 134.209.147.198 port 36960 Nov 9 07:29:52 zulu412 sshd\[11546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198 Nov 9 07:29:54 zulu412 sshd\[11546\]: Failed password for invalid user chan from 134.209.147.198 port 36960 ssh2 ... |
2019-11-09 14:47:02 |
| 201.220.95.64 | attack | Automatic report - Port Scan Attack |
2019-11-09 15:06:05 |
| 103.231.11.212 | attackbots | Automatic report - XMLRPC Attack |
2019-11-09 15:22:21 |
| 188.166.42.50 | attackspam | Nov 9 07:14:30 relay postfix/smtpd\[8806\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 9 07:15:42 relay postfix/smtpd\[8805\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 9 07:16:14 relay postfix/smtpd\[8807\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 9 07:20:39 relay postfix/smtpd\[8806\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 9 07:29:29 relay postfix/smtpd\[13810\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-09 15:01:01 |
| 200.39.231.147 | attackbots | Automatic report - Port Scan Attack |
2019-11-09 14:46:09 |
| 49.235.246.221 | attackbots | Failed password for invalid user wangfeng from 49.235.246.221 port 43040 ssh2 Invalid user 1Admin123 from 49.235.246.221 port 43318 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.246.221 Failed password for invalid user 1Admin123 from 49.235.246.221 port 43318 ssh2 Invalid user drishti from 49.235.246.221 port 43594 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.246.221 |
2019-11-09 15:19:21 |