City: La Crosse
Region: Wisconsin
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.49.78.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.49.78.254. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 13:59:12 CST 2025
;; MSG SIZE rcvd: 106
Host 254.78.49.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 254.78.49.138.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.99.152.121 | attack | Sep 11 13:24:09 h2177944 sshd\[5638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.152.121 user=www-data Sep 11 13:24:11 h2177944 sshd\[5638\]: Failed password for www-data from 192.99.152.121 port 45764 ssh2 Sep 11 13:30:29 h2177944 sshd\[5907\]: Invalid user test1 from 192.99.152.121 port 53300 Sep 11 13:30:29 h2177944 sshd\[5907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.152.121 ... |
2019-09-11 19:57:29 |
| 210.21.226.2 | attackspam | Sep 11 11:40:54 localhost sshd\[111583\]: Invalid user sysadmin from 210.21.226.2 port 42400 Sep 11 11:40:54 localhost sshd\[111583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2 Sep 11 11:40:57 localhost sshd\[111583\]: Failed password for invalid user sysadmin from 210.21.226.2 port 42400 ssh2 Sep 11 11:48:14 localhost sshd\[111819\]: Invalid user ts3 from 210.21.226.2 port 8892 Sep 11 11:48:14 localhost sshd\[111819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2 ... |
2019-09-11 20:01:49 |
| 190.104.153.41 | attackbots | Sep 11 11:09:36 MK-Soft-VM5 sshd\[32332\]: Invalid user 123456 from 190.104.153.41 port 54848 Sep 11 11:09:36 MK-Soft-VM5 sshd\[32332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.153.41 Sep 11 11:09:38 MK-Soft-VM5 sshd\[32332\]: Failed password for invalid user 123456 from 190.104.153.41 port 54848 ssh2 ... |
2019-09-11 19:41:03 |
| 212.92.101.85 | attack | Multiple failed RDP login attempts |
2019-09-11 20:17:12 |
| 117.50.17.253 | attack | Sep 11 09:53:14 mout sshd[23916]: Invalid user jenkins from 117.50.17.253 port 55014 |
2019-09-11 20:28:21 |
| 18.217.44.151 | attackspam | Sep 11 09:45:27 sd1 sshd[13258]: Invalid user uftp from 18.217.44.151 Sep 11 09:45:29 sd1 sshd[13258]: Failed password for invalid user uftp from 18.217.44.151 port 42782 ssh2 Sep 11 10:18:31 sd1 sshd[14002]: Invalid user ubuntu from 18.217.44.151 Sep 11 10:18:33 sd1 sshd[14002]: Failed password for invalid user ubuntu from 18.217.44.151 port 37488 ssh2 Sep 11 10:39:32 sd1 sshd[14616]: Invalid user deploy from 18.217.44.151 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=18.217.44.151 |
2019-09-11 19:54:51 |
| 185.9.3.48 | attackbotsspam | Sep 11 01:31:38 friendsofhawaii sshd\[10364\]: Invalid user Password from 185.9.3.48 Sep 11 01:31:38 friendsofhawaii sshd\[10364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185-9-3-48.jallabredband.se Sep 11 01:31:41 friendsofhawaii sshd\[10364\]: Failed password for invalid user Password from 185.9.3.48 port 58658 ssh2 Sep 11 01:38:04 friendsofhawaii sshd\[10928\]: Invalid user teste1 from 185.9.3.48 Sep 11 01:38:04 friendsofhawaii sshd\[10928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185-9-3-48.jallabredband.se |
2019-09-11 19:56:28 |
| 51.77.140.244 | attackbots | Sep 11 11:22:03 web8 sshd\[32397\]: Invalid user test from 51.77.140.244 Sep 11 11:22:03 web8 sshd\[32397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244 Sep 11 11:22:05 web8 sshd\[32397\]: Failed password for invalid user test from 51.77.140.244 port 44770 ssh2 Sep 11 11:31:21 web8 sshd\[5065\]: Invalid user sammy from 51.77.140.244 Sep 11 11:31:21 web8 sshd\[5065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244 |
2019-09-11 19:48:48 |
| 189.112.109.185 | attack | Sep 11 14:36:08 yabzik sshd[32039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.109.185 Sep 11 14:36:11 yabzik sshd[32039]: Failed password for invalid user csserver from 189.112.109.185 port 55744 ssh2 Sep 11 14:43:51 yabzik sshd[3591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.109.185 |
2019-09-11 19:46:13 |
| 103.105.98.1 | attackbotsspam | Sep 11 10:55:42 minden010 sshd[24907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.98.1 Sep 11 10:55:44 minden010 sshd[24907]: Failed password for invalid user postgres from 103.105.98.1 port 53612 ssh2 Sep 11 11:02:38 minden010 sshd[27294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.98.1 ... |
2019-09-11 19:41:31 |
| 92.222.216.81 | attack | Sep 11 10:00:40 work-partkepr sshd\[26805\]: Invalid user tester from 92.222.216.81 port 47794 Sep 11 10:00:40 work-partkepr sshd\[26805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.81 ... |
2019-09-11 19:51:46 |
| 220.248.17.34 | attack | Sep 11 13:30:53 andromeda sshd\[26890\]: Invalid user admin from 220.248.17.34 port 56799 Sep 11 13:30:53 andromeda sshd\[26890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.17.34 Sep 11 13:30:55 andromeda sshd\[26890\]: Failed password for invalid user admin from 220.248.17.34 port 56799 ssh2 |
2019-09-11 19:44:02 |
| 201.38.172.76 | attackbots | $f2bV_matches |
2019-09-11 20:26:52 |
| 159.89.235.61 | attackspambots | Sep 11 07:45:09 ny01 sshd[7913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.235.61 Sep 11 07:45:11 ny01 sshd[7913]: Failed password for invalid user mcserver from 159.89.235.61 port 36944 ssh2 Sep 11 07:51:23 ny01 sshd[9021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.235.61 |
2019-09-11 20:05:58 |
| 5.45.6.66 | attack | $f2bV_matches |
2019-09-11 20:11:52 |