City: Reykjavik
Region: Capital Region
Country: Iceland
Internet Service Provider: Nova
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
139.28.106.28 | attack | Automatic report - Port Scan Attack |
2020-02-20 07:59:56 |
139.28.136.141 | attack | Mon, 22 Jul 2019 23:28:37 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-23 08:15:24 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.28.1.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10134
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.28.1.80. IN A
;; AUTHORITY SECTION:
. 542 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020011502 1800 900 604800 86400
;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 16 08:12:51 CST 2020
;; MSG SIZE rcvd: 115
Host 80.1.28.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 80.1.28.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
1.47.41.227 | attackbotsspam | 2020-03-14 14:16:24 H=\(\[1.47.41.227\]\) \[1.47.41.227\]:52635 I=\[193.107.88.166\]:25 F=\ |
2020-06-01 22:38:53 |
129.226.74.89 | attackbots | SSH auth scanning - multiple failed logins |
2020-06-01 23:05:34 |
202.29.33.245 | attackbotsspam | Jun 1 17:18:08 journals sshd\[57086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.33.245 user=root Jun 1 17:18:10 journals sshd\[57086\]: Failed password for root from 202.29.33.245 port 33232 ssh2 Jun 1 17:22:36 journals sshd\[57704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.33.245 user=root Jun 1 17:22:38 journals sshd\[57704\]: Failed password for root from 202.29.33.245 port 37152 ssh2 Jun 1 17:27:04 journals sshd\[58371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.33.245 user=root ... |
2020-06-01 23:00:21 |
222.186.3.249 | attack | Jun 1 16:48:25 OPSO sshd\[17823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249 user=root Jun 1 16:48:27 OPSO sshd\[17823\]: Failed password for root from 222.186.3.249 port 57671 ssh2 Jun 1 16:48:29 OPSO sshd\[17823\]: Failed password for root from 222.186.3.249 port 57671 ssh2 Jun 1 16:48:32 OPSO sshd\[17823\]: Failed password for root from 222.186.3.249 port 57671 ssh2 Jun 1 16:49:48 OPSO sshd\[17851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249 user=root |
2020-06-01 22:50:28 |
81.19.215.118 | attackbotsspam | 81.19.215.118 - - [01/Jun/2020:18:05:07 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-06-01 22:35:02 |
201.219.50.217 | attackspambots | Jun 1 16:19:51 server sshd[51583]: Failed password for root from 201.219.50.217 port 46466 ssh2 Jun 1 16:23:28 server sshd[54568]: Failed password for root from 201.219.50.217 port 40640 ssh2 Jun 1 16:27:07 server sshd[57360]: Failed password for root from 201.219.50.217 port 34812 ssh2 |
2020-06-01 23:13:34 |
211.103.222.34 | attackbots | Jun 1 16:02:36 localhost sshd\[10393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.103.222.34 user=root Jun 1 16:02:38 localhost sshd\[10393\]: Failed password for root from 211.103.222.34 port 56605 ssh2 Jun 1 16:06:23 localhost sshd\[10613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.103.222.34 user=root Jun 1 16:06:25 localhost sshd\[10613\]: Failed password for root from 211.103.222.34 port 16932 ssh2 Jun 1 16:09:44 localhost sshd\[10757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.103.222.34 user=root ... |
2020-06-01 23:02:28 |
162.243.170.252 | attack | Jun 1 15:49:58 cdc sshd[2712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.170.252 user=root Jun 1 15:49:59 cdc sshd[2712]: Failed password for invalid user root from 162.243.170.252 port 52300 ssh2 |
2020-06-01 22:52:03 |
24.37.113.22 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-06-01 22:55:18 |
1.46.239.61 | attackspam | 2020-05-01 18:08:02 1jUYCi-00047T-NV SMTP connection from \(\[1.46.239.61\]\) \[1.46.239.61\]:60602 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-05-01 18:09:17 1jUYDt-0004AE-5R SMTP connection from \(\[1.46.239.61\]\) \[1.46.239.61\]:60603 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-05-01 18:10:18 1jUYEr-0004EH-1r SMTP connection from \(\[1.46.239.61\]\) \[1.46.239.61\]:60604 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-06-01 22:46:24 |
79.137.82.213 | attack | Jun 1 07:09:21 server1 sshd\[26029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213 user=root Jun 1 07:09:23 server1 sshd\[26029\]: Failed password for root from 79.137.82.213 port 45960 ssh2 Jun 1 07:12:52 server1 sshd\[27297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213 user=root Jun 1 07:12:55 server1 sshd\[27297\]: Failed password for root from 79.137.82.213 port 51074 ssh2 Jun 1 07:16:17 server1 sshd\[28372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213 user=root ... |
2020-06-01 22:32:18 |
200.248.90.11 | attack | Jun 1 16:21:32 server sshd[53051]: Failed password for root from 200.248.90.11 port 50298 ssh2 Jun 1 16:26:07 server sshd[56651]: Failed password for root from 200.248.90.11 port 54792 ssh2 Jun 1 16:30:39 server sshd[60184]: Failed password for root from 200.248.90.11 port 59288 ssh2 |
2020-06-01 23:02:50 |
212.83.166.62 | attackbotsspam | Sending illegal POST request from possible spammer. |
2020-06-01 22:55:42 |
182.16.103.34 | attackbotsspam | Jun 1 13:15:30 sigma sshd\[6194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.103.34 user=rootJun 1 13:27:36 sigma sshd\[7754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.103.34 user=root ... |
2020-06-01 22:37:46 |
37.59.57.87 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-06-01 23:05:17 |