City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.8.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.0.8.140. IN A
;; AUTHORITY SECTION:
. 281 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:21:07 CST 2022
;; MSG SIZE rcvd: 104
140.8.0.141.in-addr.arpa domain name pointer sg22-04-10.opera-mini.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.8.0.141.in-addr.arpa name = sg22-04-10.opera-mini.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 125.71.236.17 | attackspam | Jun 4 22:20:40 master sshd[9908]: Failed password for root from 125.71.236.17 port 59988 ssh2 Jun 4 22:37:06 master sshd[10378]: Failed password for root from 125.71.236.17 port 46500 ssh2 Jun 4 22:40:13 master sshd[10468]: Failed password for root from 125.71.236.17 port 39104 ssh2 Jun 4 22:43:21 master sshd[10482]: Failed password for root from 125.71.236.17 port 59928 ssh2 Jun 4 22:46:32 master sshd[10537]: Failed password for root from 125.71.236.17 port 52540 ssh2 Jun 4 22:49:45 master sshd[10553]: Failed password for root from 125.71.236.17 port 45152 ssh2 Jun 4 22:52:55 master sshd[10604]: Failed password for root from 125.71.236.17 port 37742 ssh2 Jun 4 22:56:01 master sshd[10618]: Failed password for root from 125.71.236.17 port 58580 ssh2 Jun 4 22:59:08 master sshd[10636]: Failed password for root from 125.71.236.17 port 51182 ssh2 Jun 4 23:02:20 master sshd[11064]: Failed password for root from 125.71.236.17 port 43776 ssh2 |
2020-06-05 05:59:25 |
| 51.91.157.101 | attackspam | Jun 4 23:25:37 santamaria sshd\[15285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.101 user=root Jun 4 23:25:39 santamaria sshd\[15285\]: Failed password for root from 51.91.157.101 port 57192 ssh2 Jun 4 23:28:58 santamaria sshd\[15346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.101 user=root ... |
2020-06-05 06:09:35 |
| 156.212.148.240 | attackspam | Limit on login attempts is reached |
2020-06-05 05:59:00 |
| 165.22.248.55 | attackspam | Lines containing failures of 165.22.248.55 Jun 4 00:46:22 shared06 sshd[16287]: Connection closed by 165.22.248.55 port 45744 [preauth] Jun 4 00:46:22 shared06 sshd[16289]: Connection closed by 165.22.248.55 port 45758 [preauth] Jun 4 00:46:43 shared06 sshd[16335]: Connection closed by 165.22.248.55 port 50738 [preauth] Jun 4 02:20:05 shared06 sshd[13764]: Connection closed by 165.22.248.55 port 60452 [preauth] Jun 4 02:20:05 shared06 sshd[13766]: Connection closed by 165.22.248.55 port 60554 [preauth] Jun 4 02:26:13 shared06 sshd[15911]: Connection closed by 165.22.248.55 port 54836 [preauth] Jun 4 02:31:41 shared06 sshd[17965]: Connection closed by 165.22.248.55 port 38802 [preauth] Jun 4 03:14:36 shared06 sshd[31102]: Connection closed by 165.22.248.55 port 44126 [preauth] Jun 4 03:14:36 shared06 sshd[31104]: Connection closed by 165.22.248.55 port 44270 [preauth] Jun 4 04:25:49 shared06 sshd[30341]: Connection closed by 165.22.248.55 port 58006 [preauth] Ju........ ------------------------------ |
2020-06-05 05:48:24 |
| 180.168.212.6 | attack | (sshd) Failed SSH login from 180.168.212.6 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 5 00:00:34 s1 sshd[15043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.212.6 user=root Jun 5 00:00:36 s1 sshd[15043]: Failed password for root from 180.168.212.6 port 53150 ssh2 Jun 5 00:03:50 s1 sshd[15186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.212.6 user=root Jun 5 00:03:52 s1 sshd[15186]: Failed password for root from 180.168.212.6 port 51506 ssh2 Jun 5 00:07:30 s1 sshd[15550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.212.6 user=root |
2020-06-05 05:32:52 |
| 18.223.126.19 | attack | Brute forcing email accounts |
2020-06-05 05:33:45 |
| 2.136.198.12 | attackspambots | $f2bV_matches |
2020-06-05 05:37:33 |
| 140.143.247.30 | attackspam | Jun 4 23:26:12 vmi345603 sshd[546]: Failed password for root from 140.143.247.30 port 37506 ssh2 ... |
2020-06-05 05:54:02 |
| 36.133.38.45 | attackbots | Jun 4 22:02:56 mail sshd[16162]: Failed password for root from 36.133.38.45 port 38430 ssh2 ... |
2020-06-05 05:56:23 |
| 61.141.221.236 | attackspam | 2020-06-04T20:55:27.302354ionos.janbro.de sshd[44968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.141.221.236 user=root 2020-06-04T20:55:29.095633ionos.janbro.de sshd[44968]: Failed password for root from 61.141.221.236 port 56272 ssh2 2020-06-04T20:58:50.653096ionos.janbro.de sshd[44993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.141.221.236 user=root 2020-06-04T20:58:52.606733ionos.janbro.de sshd[44993]: Failed password for root from 61.141.221.236 port 46316 ssh2 2020-06-04T21:02:14.348585ionos.janbro.de sshd[45019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.141.221.236 user=root 2020-06-04T21:02:15.992154ionos.janbro.de sshd[45019]: Failed password for root from 61.141.221.236 port 36358 ssh2 2020-06-04T21:05:35.580263ionos.janbro.de sshd[45031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61 ... |
2020-06-05 05:38:10 |
| 193.112.39.179 | attack | Jun 4 17:11:28 ws22vmsma01 sshd[62389]: Failed password for root from 193.112.39.179 port 37908 ssh2 ... |
2020-06-05 06:04:39 |
| 153.126.172.136 | attackspambots | Jun 4 21:26:20 game-panel sshd[7346]: Failed password for root from 153.126.172.136 port 51112 ssh2 Jun 4 21:29:52 game-panel sshd[7494]: Failed password for root from 153.126.172.136 port 52908 ssh2 |
2020-06-05 06:00:39 |
| 87.27.143.210 | attackspam | DATE:2020-06-04 22:22:33, IP:87.27.143.210, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-06-05 06:02:06 |
| 167.172.121.115 | attackspambots | (sshd) Failed SSH login from 167.172.121.115 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 5 00:01:18 s1 sshd[15101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.121.115 user=root Jun 5 00:01:20 s1 sshd[15101]: Failed password for root from 167.172.121.115 port 44176 ssh2 Jun 5 00:04:41 s1 sshd[15253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.121.115 user=root Jun 5 00:04:43 s1 sshd[15253]: Failed password for root from 167.172.121.115 port 48116 ssh2 Jun 5 00:08:05 s1 sshd[15618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.121.115 user=root |
2020-06-05 05:58:20 |
| 128.1.132.221 | attackbots | Jun 4 20:14:42 localhost sshd[1097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.132.221 user=root Jun 4 20:14:44 localhost sshd[1097]: Failed password for root from 128.1.132.221 port 55238 ssh2 Jun 4 20:18:36 localhost sshd[1480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.132.221 user=root Jun 4 20:18:38 localhost sshd[1480]: Failed password for root from 128.1.132.221 port 37776 ssh2 Jun 4 20:22:26 localhost sshd[1842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.132.221 user=root Jun 4 20:22:28 localhost sshd[1842]: Failed password for root from 128.1.132.221 port 48546 ssh2 ... |
2020-06-05 06:06:30 |