City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.102.128.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.102.128.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 19:19:07 CST 2025
;; MSG SIZE rcvd: 107
Host 50.128.102.137.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.128.102.137.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.144.49.115 | attack | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-09-01 05:45:17 |
| 161.97.68.99 | attack | xmlrpc attack |
2020-09-01 05:56:49 |
| 189.237.25.126 | attack | 2020-09-01T00:09:09.253382afi-git.jinr.ru sshd[25469]: Invalid user r from 189.237.25.126 port 43958 2020-09-01T00:09:09.257003afi-git.jinr.ru sshd[25469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.237.25.126 2020-09-01T00:09:09.253382afi-git.jinr.ru sshd[25469]: Invalid user r from 189.237.25.126 port 43958 2020-09-01T00:09:11.455657afi-git.jinr.ru sshd[25469]: Failed password for invalid user r from 189.237.25.126 port 43958 ssh2 2020-09-01T00:12:50.238851afi-git.jinr.ru sshd[26355]: Invalid user liyan from 189.237.25.126 port 49854 ... |
2020-09-01 06:02:55 |
| 213.217.1.44 | attackspambots | Fail2Ban Ban Triggered |
2020-09-01 05:55:14 |
| 122.51.238.27 | attackbots | (sshd) Failed SSH login from 122.51.238.27 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 31 22:54:06 amsweb01 sshd[14910]: Invalid user gmodserver from 122.51.238.27 port 44690 Aug 31 22:54:08 amsweb01 sshd[14910]: Failed password for invalid user gmodserver from 122.51.238.27 port 44690 ssh2 Aug 31 23:04:56 amsweb01 sshd[16568]: Invalid user zj from 122.51.238.27 port 44850 Aug 31 23:04:57 amsweb01 sshd[16568]: Failed password for invalid user zj from 122.51.238.27 port 44850 ssh2 Aug 31 23:12:39 amsweb01 sshd[17641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.238.27 user=root |
2020-09-01 06:07:27 |
| 195.54.160.180 | attack | 2020-09-01T01:13:38.655841snf-827550 sshd[16199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 2020-09-01T01:13:38.343779snf-827550 sshd[16199]: Invalid user admin from 195.54.160.180 port 57622 2020-09-01T01:13:40.671310snf-827550 sshd[16199]: Failed password for invalid user admin from 195.54.160.180 port 57622 ssh2 ... |
2020-09-01 06:13:53 |
| 193.112.251.36 | attackspam | Sep 1 00:09:14 OPSO sshd\[27416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.251.36 user=root Sep 1 00:09:16 OPSO sshd\[27416\]: Failed password for root from 193.112.251.36 port 59850 ssh2 Sep 1 00:13:06 OPSO sshd\[28421\]: Invalid user user from 193.112.251.36 port 55730 Sep 1 00:13:06 OPSO sshd\[28421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.251.36 Sep 1 00:13:08 OPSO sshd\[28421\]: Failed password for invalid user user from 193.112.251.36 port 55730 ssh2 |
2020-09-01 06:21:01 |
| 129.152.141.71 | attackspam | Aug 31 23:38:52 inter-technics sshd[13721]: Invalid user dino from 129.152.141.71 port 19142 Aug 31 23:38:52 inter-technics sshd[13721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.152.141.71 Aug 31 23:38:52 inter-technics sshd[13721]: Invalid user dino from 129.152.141.71 port 19142 Aug 31 23:38:54 inter-technics sshd[13721]: Failed password for invalid user dino from 129.152.141.71 port 19142 ssh2 Aug 31 23:41:23 inter-technics sshd[13984]: Invalid user elk from 129.152.141.71 port 35301 ... |
2020-09-01 05:54:28 |
| 46.101.97.5 | attackspambots | Aug 31 23:18:56 h1745522 sshd[26864]: Invalid user prd from 46.101.97.5 port 47000 Aug 31 23:18:56 h1745522 sshd[26864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.97.5 Aug 31 23:18:56 h1745522 sshd[26864]: Invalid user prd from 46.101.97.5 port 47000 Aug 31 23:18:59 h1745522 sshd[26864]: Failed password for invalid user prd from 46.101.97.5 port 47000 ssh2 Aug 31 23:23:26 h1745522 sshd[27371]: Invalid user abc from 46.101.97.5 port 54494 Aug 31 23:23:26 h1745522 sshd[27371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.97.5 Aug 31 23:23:26 h1745522 sshd[27371]: Invalid user abc from 46.101.97.5 port 54494 Aug 31 23:23:29 h1745522 sshd[27371]: Failed password for invalid user abc from 46.101.97.5 port 54494 ssh2 Aug 31 23:27:31 h1745522 sshd[27863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.97.5 user=root Aug 31 23:27:33 h1745522 ss ... |
2020-09-01 06:10:33 |
| 222.186.30.112 | attackbotsspam | 2020-09-01T00:08[Censored Hostname] sshd[4784]: Failed password for root from 222.186.30.112 port 19929 ssh2 2020-09-01T00:08[Censored Hostname] sshd[4784]: Failed password for root from 222.186.30.112 port 19929 ssh2 2020-09-01T00:08[Censored Hostname] sshd[4784]: Failed password for root from 222.186.30.112 port 19929 ssh2[...] |
2020-09-01 06:11:34 |
| 95.85.9.94 | attack | Aug 31 22:27:48 ns308116 sshd[31919]: Invalid user jimmy from 95.85.9.94 port 54685 Aug 31 22:27:48 ns308116 sshd[31919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.9.94 Aug 31 22:27:50 ns308116 sshd[31919]: Failed password for invalid user jimmy from 95.85.9.94 port 54685 ssh2 Aug 31 22:35:22 ns308116 sshd[21584]: Invalid user ftpuser from 95.85.9.94 port 58183 Aug 31 22:35:22 ns308116 sshd[21584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.9.94 ... |
2020-09-01 06:16:25 |
| 94.46.53.103 | attack | Email rejected due to spam filtering |
2020-09-01 06:19:15 |
| 45.142.120.89 | attackspambots | 2020-09-01 00:53:57 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=vod2@org.ua\)2020-09-01 00:54:33 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=harvest@org.ua\)2020-09-01 00:55:12 dovecot_login authenticator failed for \(User\) \[45.142.120.89\]: 535 Incorrect authentication data \(set_id=counseling@org.ua\) ... |
2020-09-01 06:02:38 |
| 109.251.68.112 | attack | Aug 31 21:46:33 jumpserver sshd[135292]: Invalid user tomcat from 109.251.68.112 port 51034 Aug 31 21:46:35 jumpserver sshd[135292]: Failed password for invalid user tomcat from 109.251.68.112 port 51034 ssh2 Aug 31 21:52:34 jumpserver sshd[135316]: Invalid user kyle from 109.251.68.112 port 56100 ... |
2020-09-01 06:00:13 |
| 23.129.64.208 | attack | Aug 31 23:12:41 nas sshd[15761]: Failed password for root from 23.129.64.208 port 58932 ssh2 Aug 31 23:12:45 nas sshd[15761]: Failed password for root from 23.129.64.208 port 58932 ssh2 Aug 31 23:12:50 nas sshd[15761]: Failed password for root from 23.129.64.208 port 58932 ssh2 Aug 31 23:12:54 nas sshd[15761]: Failed password for root from 23.129.64.208 port 58932 ssh2 ... |
2020-09-01 06:13:24 |