City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.98.8.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30615
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.98.8.42. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 21:47:22 CST 2019
;; MSG SIZE rcvd: 115
Host 42.8.98.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 42.8.98.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
107.175.24.229 | attackspam | Nov 11 20:45:51 server sshd\[31268\]: Invalid user www from 107.175.24.229 Nov 11 20:45:51 server sshd\[31268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.24.229 Nov 11 20:45:53 server sshd\[31268\]: Failed password for invalid user www from 107.175.24.229 port 44974 ssh2 Nov 11 21:06:21 server sshd\[4347\]: Invalid user haubold from 107.175.24.229 Nov 11 21:06:21 server sshd\[4347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.24.229 ... |
2019-11-12 02:07:19 |
122.166.95.33 | attackspambots | namecheap spam |
2019-11-12 01:52:33 |
129.213.153.229 | attackspam | Nov 11 17:34:37 srv01 sshd[696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.153.229 user=backup Nov 11 17:34:39 srv01 sshd[696]: Failed password for backup from 129.213.153.229 port 63218 ssh2 Nov 11 17:38:06 srv01 sshd[858]: Invalid user sandwijk from 129.213.153.229 Nov 11 17:38:06 srv01 sshd[858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.153.229 Nov 11 17:38:06 srv01 sshd[858]: Invalid user sandwijk from 129.213.153.229 Nov 11 17:38:08 srv01 sshd[858]: Failed password for invalid user sandwijk from 129.213.153.229 port 25396 ssh2 ... |
2019-11-12 01:29:40 |
185.216.140.252 | attackspam | *Port Scan* detected from 185.216.140.252 (NL/Netherlands/-). 4 hits in the last 45 seconds |
2019-11-12 01:45:46 |
63.83.73.77 | attack | Lines containing failures of 63.83.73.77 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=63.83.73.77 |
2019-11-12 01:38:42 |
73.187.89.63 | attackspambots | Nov 11 12:45:42 firewall sshd[6969]: Failed password for invalid user server from 73.187.89.63 port 37940 ssh2 Nov 11 12:49:31 firewall sshd[7048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.187.89.63 user=root Nov 11 12:49:34 firewall sshd[7048]: Failed password for root from 73.187.89.63 port 47514 ssh2 ... |
2019-11-12 01:47:25 |
51.255.162.65 | attackspambots | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-11-12 01:39:18 |
165.22.103.237 | attackspambots | Nov 11 16:45:42 server sshd\[617\]: Invalid user usuario from 165.22.103.237 Nov 11 16:45:42 server sshd\[617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.103.237 Nov 11 16:45:44 server sshd\[617\]: Failed password for invalid user usuario from 165.22.103.237 port 37946 ssh2 Nov 11 17:55:27 server sshd\[18768\]: Invalid user usuario from 165.22.103.237 Nov 11 17:55:27 server sshd\[18768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.103.237 ... |
2019-11-12 02:06:28 |
173.245.239.249 | attack | failed_logins |
2019-11-12 01:37:13 |
213.167.46.166 | attack | F2B jail: sshd. Time: 2019-11-11 18:53:24, Reported by: VKReport |
2019-11-12 02:04:40 |
49.74.219.26 | attack | Invalid user admin from 49.74.219.26 port 14869 |
2019-11-12 01:50:21 |
197.44.94.127 | attackspam | failed_logins |
2019-11-12 01:52:52 |
14.233.80.89 | attack | Nov 11 15:30:12 mxgate1 postfix/postscreen[21735]: CONNECT from [14.233.80.89]:31714 to [176.31.12.44]:25 Nov 11 15:30:12 mxgate1 postfix/dnsblog[22084]: addr 14.233.80.89 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 11 15:30:12 mxgate1 postfix/dnsblog[22084]: addr 14.233.80.89 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 11 15:30:12 mxgate1 postfix/dnsblog[22085]: addr 14.233.80.89 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 11 15:30:12 mxgate1 postfix/dnsblog[22093]: addr 14.233.80.89 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 11 15:30:18 mxgate1 postfix/postscreen[21735]: DNSBL rank 4 for [14.233.80.89]:31714 Nov x@x Nov 11 15:30:20 mxgate1 postfix/postscreen[21735]: HANGUP after 2.3 from [14.233.80.89]:31714 in tests after SMTP handshake Nov 11 15:30:20 mxgate1 postfix/postscreen[21735]: DISCONNECT [14.233.80.89]:31714 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.233.80.89 |
2019-11-12 02:01:13 |
217.56.124.218 | attackspambots | Nov 12 02:51:46 our-server-hostname postfix/smtpd[22289]: connect from unknown[217.56.124.218] Nov x@x Nov 12 02:51:47 our-server-hostname postfix/smtpd[22289]: lost connection after DATA from unknown[217.56.124.218] Nov 12 02:51:47 our-server-hostname postfix/smtpd[22289]: disconnect from unknown[217.56.124.218] Nov 12 02:51:51 our-server-hostname postfix/smtpd[22550]: connect from unknown[217.56.124.218] Nov x@x Nov 12 02:51:52 our-server-hostname postfix/smtpd[22550]: lost connection after DATA from unknown[217.56.124.218] Nov 12 02:51:52 our-server-hostname postfix/smtpd[22550]: disconnect from unknown[217.56.124.218] Nov 12 02:52:03 our-server-hostname postfix/smtpd[22550]: connect from unknown[217.56.124.218] Nov x@x Nov x@x Nov 12 02:52:04 our-server-hostname postfix/smtpd[22550]: lost connection after DATA from unknown[217.56.124.218] Nov 12 02:52:04 our-server-hostname postfix/smtpd[22550]: disconnect from unknown[217.56.124.218] Nov 12 02:52:16 our-server-host........ ------------------------------- |
2019-11-12 02:04:16 |
122.152.203.83 | attack | 2019-11-11T17:27:43.782988abusebot-7.cloudsearch.cf sshd\[18731\]: Invalid user guest000 from 122.152.203.83 port 55216 |
2019-11-12 01:48:01 |