City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.150.149.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.150.149.10. IN A
;; AUTHORITY SECTION:
. 381 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024060600 1800 900 604800 86400
;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 06 16:40:09 CST 2024
;; MSG SIZE rcvd: 107
b'Host 10.149.150.138.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 138.150.149.10.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
157.230.153.75 | attack | Aug 30 16:55:51 hanapaa sshd\[9361\]: Invalid user applmgr from 157.230.153.75 Aug 30 16:55:51 hanapaa sshd\[9361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.153.75 Aug 30 16:55:54 hanapaa sshd\[9361\]: Failed password for invalid user applmgr from 157.230.153.75 port 56498 ssh2 Aug 30 17:00:07 hanapaa sshd\[9710\]: Invalid user buero from 157.230.153.75 Aug 30 17:00:07 hanapaa sshd\[9710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.153.75 |
2019-08-31 11:02:15 |
120.85.56.219 | attackbots | Unauthorized access to SSH at 31/Aug/2019:02:37:58 +0000. |
2019-08-31 11:09:33 |
187.32.120.215 | attackbots | Aug 31 05:20:02 Server10 sshd[12438]: Failed password for invalid user ubuntu from 187.32.120.215 port 38536 ssh2 Aug 31 05:25:30 Server10 sshd[25076]: Failed password for invalid user honeyridge from 187.32.120.215 port 59042 ssh2 Aug 31 05:30:18 Server10 sshd[32521]: Failed password for invalid user sowmya from 187.32.120.215 port 46904 ssh2 |
2019-08-31 11:37:05 |
142.93.101.13 | attackspambots | Total attacks: 4 |
2019-08-31 11:10:03 |
68.183.133.21 | attackbotsspam | Aug 31 05:35:30 plex sshd[31333]: Invalid user rahul from 68.183.133.21 port 40932 |
2019-08-31 11:49:50 |
129.211.128.20 | attackbotsspam | Aug 30 16:48:59 hiderm sshd\[359\]: Invalid user snagg from 129.211.128.20 Aug 30 16:48:59 hiderm sshd\[359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.128.20 Aug 30 16:49:00 hiderm sshd\[359\]: Failed password for invalid user snagg from 129.211.128.20 port 43701 ssh2 Aug 30 16:53:56 hiderm sshd\[778\]: Invalid user info4 from 129.211.128.20 Aug 30 16:53:56 hiderm sshd\[778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.128.20 |
2019-08-31 11:05:46 |
34.74.99.116 | attackbots | Lines containing failures of 34.74.99.116 Aug 29 19:46:00 mailserver sshd[26780]: Invalid user admin from 34.74.99.116 port 38142 Aug 29 19:46:00 mailserver sshd[26780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.74.99.116 Aug 29 19:46:03 mailserver sshd[26780]: Failed password for invalid user admin from 34.74.99.116 port 38142 ssh2 Aug 29 19:46:03 mailserver sshd[26780]: error: Received disconnect from 34.74.99.116 port 38142:3: com.jcraft.jsch.JSchException: Auth fail [preauth] Aug 29 19:46:03 mailserver sshd[26780]: Disconnected from invalid user admin 34.74.99.116 port 38142 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=34.74.99.116 |
2019-08-31 11:34:52 |
210.21.226.2 | attack | Aug 30 23:24:08 TORMINT sshd\[22803\]: Invalid user test from 210.21.226.2 Aug 30 23:24:09 TORMINT sshd\[22803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2 Aug 30 23:24:10 TORMINT sshd\[22803\]: Failed password for invalid user test from 210.21.226.2 port 5090 ssh2 ... |
2019-08-31 11:43:42 |
41.208.150.114 | attack | Aug 31 03:08:49 game-panel sshd[16995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114 Aug 31 03:08:51 game-panel sshd[16995]: Failed password for invalid user teamspeak from 41.208.150.114 port 52666 ssh2 Aug 31 03:13:29 game-panel sshd[17290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114 |
2019-08-31 11:26:38 |
54.37.17.251 | attackspambots | Aug 31 05:22:09 vps691689 sshd[10744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.17.251 Aug 31 05:22:11 vps691689 sshd[10744]: Failed password for invalid user temp from 54.37.17.251 port 60682 ssh2 ... |
2019-08-31 11:29:32 |
104.238.116.94 | attackspambots | 2019-08-26T08:20:10.637899wiz-ks3 sshd[19150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-104-238-116-94.ip.secureserver.net user=root 2019-08-26T08:20:13.150567wiz-ks3 sshd[19150]: Failed password for root from 104.238.116.94 port 52794 ssh2 2019-08-26T08:31:23.126759wiz-ks3 sshd[19177]: Invalid user ftp123 from 104.238.116.94 port 40278 2019-08-26T08:31:23.128831wiz-ks3 sshd[19177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-104-238-116-94.ip.secureserver.net 2019-08-26T08:31:23.126759wiz-ks3 sshd[19177]: Invalid user ftp123 from 104.238.116.94 port 40278 2019-08-26T08:31:24.698061wiz-ks3 sshd[19177]: Failed password for invalid user ftp123 from 104.238.116.94 port 40278 ssh2 2019-08-26T08:45:09.877193wiz-ks3 sshd[19217]: Invalid user configure from 104.238.116.94 port 56190 2019-08-26T08:45:09.879347wiz-ks3 sshd[19217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-1 |
2019-08-31 11:00:52 |
137.74.119.50 | attackspam | Aug 31 05:14:04 plex sshd[30763]: Invalid user mahern from 137.74.119.50 port 51424 |
2019-08-31 11:33:52 |
185.150.2.234 | attackspambots | port scan and connect, tcp 1433 (ms-sql-s) |
2019-08-31 11:27:28 |
167.114.152.139 | attackbotsspam | Aug 31 00:58:33 vtv3 sshd\[8256\]: Invalid user u1 from 167.114.152.139 port 35590 Aug 31 00:58:33 vtv3 sshd\[8256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139 Aug 31 00:58:35 vtv3 sshd\[8256\]: Failed password for invalid user u1 from 167.114.152.139 port 35590 ssh2 Aug 31 01:04:31 vtv3 sshd\[11136\]: Invalid user guest from 167.114.152.139 port 56230 Aug 31 01:04:31 vtv3 sshd\[11136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139 Aug 31 01:19:10 vtv3 sshd\[18468\]: Invalid user postgres from 167.114.152.139 port 45690 Aug 31 01:19:10 vtv3 sshd\[18468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139 Aug 31 01:19:12 vtv3 sshd\[18468\]: Failed password for invalid user postgres from 167.114.152.139 port 45690 ssh2 Aug 31 01:24:07 vtv3 sshd\[21006\]: Invalid user adine from 167.114.152.139 port 60996 Aug 31 01:24:07 vtv3 sshd\ |
2019-08-31 11:37:48 |
5.196.7.123 | attackbotsspam | Aug 31 05:03:47 SilenceServices sshd[4297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.7.123 Aug 31 05:03:49 SilenceServices sshd[4297]: Failed password for invalid user kong from 5.196.7.123 port 57098 ssh2 Aug 31 05:07:38 SilenceServices sshd[5793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.7.123 |
2019-08-31 11:21:25 |