City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.150.54.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.150.54.125. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120800 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 20:59:13 CST 2024
;; MSG SIZE rcvd: 107
Host 125.54.150.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 125.54.150.140.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.27.238.202 | attackspam | Jan 7 19:43:55 odroid64 sshd\[2414\]: Invalid user gernst from 103.27.238.202 Jan 7 19:43:55 odroid64 sshd\[2414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202 Jan 7 19:43:57 odroid64 sshd\[2414\]: Failed password for invalid user gernst from 103.27.238.202 port 45424 ssh2 Jan 16 06:04:01 odroid64 sshd\[2516\]: Invalid user admin from 103.27.238.202 Jan 16 06:04:01 odroid64 sshd\[2516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202 Jan 16 06:04:04 odroid64 sshd\[2516\]: Failed password for invalid user admin from 103.27.238.202 port 42776 ssh2 Jan 19 23:58:35 odroid64 sshd\[11267\]: Invalid user deploy from 103.27.238.202 Jan 19 23:58:35 odroid64 sshd\[11267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202 Jan 19 23:58:37 odroid64 sshd\[11267\]: Failed password for invalid user deploy from 103.27.238.20 ... |
2019-10-18 02:11:27 |
| 200.54.61.34 | attackspambots | Unauthorized SMTP/IMAP/POP3 connection attempt |
2019-10-18 02:22:03 |
| 94.21.243.204 | attackspam | Oct 17 04:34:22 friendsofhawaii sshd\[21416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-243-204.static.digikabel.hu user=root Oct 17 04:34:25 friendsofhawaii sshd\[21416\]: Failed password for root from 94.21.243.204 port 44829 ssh2 Oct 17 04:39:22 friendsofhawaii sshd\[21967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-243-204.static.digikabel.hu user=root Oct 17 04:39:24 friendsofhawaii sshd\[21967\]: Failed password for root from 94.21.243.204 port 37342 ssh2 Oct 17 04:44:17 friendsofhawaii sshd\[22341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-243-204.static.digikabel.hu user=root |
2019-10-18 01:57:03 |
| 52.172.37.141 | attackbots | Oct 17 13:58:45 dedicated sshd[19728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.37.141 user=root Oct 17 13:58:47 dedicated sshd[19728]: Failed password for root from 52.172.37.141 port 52944 ssh2 |
2019-10-18 02:05:54 |
| 217.112.128.217 | attackspam | Postfix RBL failed |
2019-10-18 02:13:09 |
| 212.21.66.6 | attack | Oct 17 19:45:46 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:49 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:51 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:53 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:56 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2Oct 17 19:45:59 rotator sshd\[20640\]: Failed password for root from 212.21.66.6 port 4714 ssh2 ... |
2019-10-18 01:49:10 |
| 164.160.34.111 | attackbotsspam | 2019-10-17T14:20:56.815816abusebot-6.cloudsearch.cf sshd\[32101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.160.34.111 user=root |
2019-10-18 02:05:23 |
| 111.231.219.142 | attackbots | 2019-10-17T14:29:52.366220abusebot-8.cloudsearch.cf sshd\[2380\]: Invalid user 1QAZZAQ!@ from 111.231.219.142 port 37790 |
2019-10-18 02:04:27 |
| 110.138.151.61 | attackbots | 10/17/2019-13:36:29.748556 110.138.151.61 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-10-18 02:15:29 |
| 81.30.212.14 | attackspam | Oct 17 18:11:19 localhost sshd\[24124\]: Invalid user edi from 81.30.212.14 port 52136 Oct 17 18:11:19 localhost sshd\[24124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.212.14 Oct 17 18:11:21 localhost sshd\[24124\]: Failed password for invalid user edi from 81.30.212.14 port 52136 ssh2 ... |
2019-10-18 02:15:52 |
| 95.243.136.198 | attack | $f2bV_matches |
2019-10-18 02:23:12 |
| 218.92.0.186 | attack | Oct 17 15:21:24 tux-35-217 sshd\[21916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.186 user=root Oct 17 15:21:27 tux-35-217 sshd\[21916\]: Failed password for root from 218.92.0.186 port 63730 ssh2 Oct 17 15:21:30 tux-35-217 sshd\[21916\]: Failed password for root from 218.92.0.186 port 63730 ssh2 Oct 17 15:21:32 tux-35-217 sshd\[21916\]: Failed password for root from 218.92.0.186 port 63730 ssh2 ... |
2019-10-18 02:18:49 |
| 217.170.197.83 | attack | Oct 17 18:22:23 rotator sshd\[5798\]: Failed password for root from 217.170.197.83 port 64966 ssh2Oct 17 18:22:25 rotator sshd\[5798\]: Failed password for root from 217.170.197.83 port 64966 ssh2Oct 17 18:22:29 rotator sshd\[5798\]: Failed password for root from 217.170.197.83 port 64966 ssh2Oct 17 18:22:31 rotator sshd\[5798\]: Failed password for root from 217.170.197.83 port 64966 ssh2Oct 17 18:22:34 rotator sshd\[5798\]: Failed password for root from 217.170.197.83 port 64966 ssh2Oct 17 18:22:36 rotator sshd\[5798\]: Failed password for root from 217.170.197.83 port 64966 ssh2 ... |
2019-10-18 02:14:18 |
| 129.208.42.55 | attackbots | Automatic report - Port Scan Attack |
2019-10-18 02:19:08 |
| 164.132.111.76 | attackspam | $f2bV_matches |
2019-10-18 02:06:28 |