City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.221.222.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.221.222.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 22:48:59 CST 2025
;; MSG SIZE rcvd: 107
Host 50.222.221.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.222.221.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
46.173.211.219 | attackbots | 2019-09-05T00:51:03.397601mail01 postfix/smtpd[31251]: NOQUEUE: reject: RCPT from mail.oxydzen.de[46.173.211.219]: 550 |
2019-09-05 12:07:07 |
222.186.31.204 | attackbots | Sep 5 06:30:21 docs sshd\[17753\]: Failed password for root from 222.186.31.204 port 22006 ssh2Sep 5 06:30:24 docs sshd\[17753\]: Failed password for root from 222.186.31.204 port 22006 ssh2Sep 5 06:31:19 docs sshd\[17777\]: Failed password for root from 222.186.31.204 port 41984 ssh2Sep 5 06:32:20 docs sshd\[17794\]: Failed password for root from 222.186.31.204 port 10609 ssh2Sep 5 06:32:22 docs sshd\[17794\]: Failed password for root from 222.186.31.204 port 10609 ssh2Sep 5 06:34:15 docs sshd\[17832\]: Failed password for root from 222.186.31.204 port 63511 ssh2 ... |
2019-09-05 11:39:47 |
222.186.30.165 | attackspambots | 2019-09-05T03:26:20.066745abusebot-4.cloudsearch.cf sshd\[17019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165 user=root |
2019-09-05 11:37:27 |
202.43.164.46 | attackbots | Sep 4 22:23:00 aat-srv002 sshd[7756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.164.46 Sep 4 22:23:02 aat-srv002 sshd[7756]: Failed password for invalid user randy from 202.43.164.46 port 34526 ssh2 Sep 4 22:29:31 aat-srv002 sshd[7936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.164.46 Sep 4 22:29:33 aat-srv002 sshd[7936]: Failed password for invalid user apidoc from 202.43.164.46 port 49322 ssh2 ... |
2019-09-05 11:37:58 |
107.179.102.59 | attackspam | Attempts to probe for or exploit a Drupal site on url: /wp-content/themes/botanica-theme/style.css. Reported by the module https://www.drupal.org/project/abuseipdb. |
2019-09-05 11:59:16 |
177.190.68.31 | attackspam | 1567637961 - 09/05/2019 05:59:21 Host: 177.190.68.31/177.190.68.31 Port: 23 TCP Blocked ... |
2019-09-05 11:38:33 |
210.92.91.223 | attackbots | Sep 4 17:41:52 php2 sshd\[17555\]: Invalid user vbox from 210.92.91.223 Sep 4 17:41:52 php2 sshd\[17555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.91.223 Sep 4 17:41:54 php2 sshd\[17555\]: Failed password for invalid user vbox from 210.92.91.223 port 44520 ssh2 Sep 4 17:46:11 php2 sshd\[17933\]: Invalid user server from 210.92.91.223 Sep 4 17:46:11 php2 sshd\[17933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.91.223 |
2019-09-05 12:03:40 |
49.207.180.197 | attackspambots | Sep 4 17:47:13 friendsofhawaii sshd\[23593\]: Invalid user odoo1234 from 49.207.180.197 Sep 4 17:47:13 friendsofhawaii sshd\[23593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.180.197 Sep 4 17:47:15 friendsofhawaii sshd\[23593\]: Failed password for invalid user odoo1234 from 49.207.180.197 port 14663 ssh2 Sep 4 17:51:54 friendsofhawaii sshd\[23982\]: Invalid user password from 49.207.180.197 Sep 4 17:51:54 friendsofhawaii sshd\[23982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.180.197 |
2019-09-05 12:08:22 |
148.64.102.97 | attackbots | Portscan detected |
2019-09-05 11:43:55 |
125.227.130.5 | attack | Sep 5 06:12:02 nextcloud sshd\[31313\]: Invalid user test123 from 125.227.130.5 Sep 5 06:12:02 nextcloud sshd\[31313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.5 Sep 5 06:12:03 nextcloud sshd\[31313\]: Failed password for invalid user test123 from 125.227.130.5 port 58752 ssh2 ... |
2019-09-05 12:23:01 |
110.175.123.125 | attack | Sep 5 05:59:33 vps691689 sshd[16455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.175.123.125 Sep 5 05:59:34 vps691689 sshd[16455]: Failed password for invalid user ts from 110.175.123.125 port 36222 ssh2 Sep 5 06:05:26 vps691689 sshd[16522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.175.123.125 ... |
2019-09-05 12:10:22 |
37.49.229.145 | attackbotsspam | Attempted Administrator Privilege Gain |
2019-09-05 11:51:32 |
178.128.21.113 | attack | Sep 5 03:29:41 game-panel sshd[19738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.113 Sep 5 03:29:43 game-panel sshd[19738]: Failed password for invalid user admin3 from 178.128.21.113 port 40732 ssh2 Sep 5 03:34:16 game-panel sshd[19899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.113 |
2019-09-05 11:36:38 |
171.25.193.20 | attackbotsspam | Sep 5 11:02:03 webhost01 sshd[7869]: Failed password for root from 171.25.193.20 port 58607 ssh2 Sep 5 11:02:17 webhost01 sshd[7869]: error: maximum authentication attempts exceeded for root from 171.25.193.20 port 58607 ssh2 [preauth] ... |
2019-09-05 12:17:00 |
104.244.78.55 | attackbotsspam | Sep 5 03:54:16 thevastnessof sshd[10089]: Failed password for root from 104.244.78.55 port 56646 ssh2 ... |
2019-09-05 12:05:06 |