City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.160.29.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.160.29.56. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 11:28:25 CST 2025
;; MSG SIZE rcvd: 106
Host 56.29.160.141.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 56.29.160.141.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
212.156.115.102 | attack | Jan 1 01:56:20 root sshd[10841]: Failed password for mail from 212.156.115.102 port 54175 ssh2 Jan 1 02:01:29 root sshd[10872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.115.102 Jan 1 02:01:31 root sshd[10872]: Failed password for invalid user shonda from 212.156.115.102 port 39057 ssh2 ... |
2020-01-01 09:20:08 |
184.105.247.219 | attack | Honeypot hit. |
2020-01-01 13:00:59 |
164.68.122.79 | attackbotsspam | Dec 31 15:04:15 foo sshd[27299]: Did not receive identification string from 164.68.122.79 Dec 31 15:06:43 foo sshd[27366]: Invalid user Marian from 164.68.122.79 Dec 31 15:06:45 foo sshd[27366]: Failed password for invalid user Marian from 164.68.122.79 port 33690 ssh2 Dec 31 15:06:45 foo sshd[27366]: Received disconnect from 164.68.122.79: 11: Normal Shutdown, Thank you for playing [preauth] Dec 31 15:06:52 foo sshd[27368]: Invalid user marian from 164.68.122.79 Dec 31 15:06:53 foo sshd[27368]: Failed password for invalid user marian from 164.68.122.79 port 60322 ssh2 Dec 31 15:06:53 foo sshd[27368]: Received disconnect from 164.68.122.79: 11: Normal Shutdown, Thank you for playing [preauth] Dec 31 15:07:01 foo sshd[27370]: Invalid user minecraft from 164.68.122.79 Dec 31 15:07:03 foo sshd[27370]: Failed password for invalid user minecraft from 164.68.122.79 port 58652 ssh2 Dec 31 15:07:03 foo sshd[27370]: Received disconnect from 164.68.122.79: 11: Normal Shutdown, Th........ ------------------------------- |
2020-01-01 09:06:03 |
13.82.187.210 | attackbots | fail2ban honeypot |
2020-01-01 09:09:03 |
185.176.27.6 | attack | Jan 1 01:54:58 h2177944 kernel: \[1038741.412850\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34137 PROTO=TCP SPT=48406 DPT=3981 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 1 01:54:58 h2177944 kernel: \[1038741.412865\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34137 PROTO=TCP SPT=48406 DPT=3981 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 1 02:06:07 h2177944 kernel: \[1039410.335166\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20409 PROTO=TCP SPT=48406 DPT=5374 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 1 02:13:07 h2177944 kernel: \[1039830.549125\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=46793 PROTO=TCP SPT=48406 DPT=8348 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 1 02:13:07 h2177944 kernel: \[1039830.549138\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN= |
2020-01-01 09:15:57 |
140.246.207.140 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.207.140 user=uucp Failed password for uucp from 140.246.207.140 port 49210 ssh2 Invalid user shama from 140.246.207.140 port 44748 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.207.140 Failed password for invalid user shama from 140.246.207.140 port 44748 ssh2 |
2020-01-01 13:01:29 |
66.249.79.54 | attackbotsspam | Automatic report - Banned IP Access |
2020-01-01 09:13:59 |
45.113.77.26 | attackspam | Jan 1 05:11:18 game-panel sshd[2293]: Failed password for root from 45.113.77.26 port 42806 ssh2 Jan 1 05:14:25 game-panel sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.113.77.26 Jan 1 05:14:27 game-panel sshd[2413]: Failed password for invalid user udo from 45.113.77.26 port 44010 ssh2 |
2020-01-01 13:15:30 |
106.12.31.173 | attackspambots | $f2bV_matches |
2020-01-01 09:07:05 |
78.190.156.238 | attack | Lines containing failures of 78.190.156.238 Dec 31 23:30:48 home sshd[12822]: Invalid user username from 78.190.156.238 port 37592 Dec 31 23:30:48 home sshd[12822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.190.156.238 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=78.190.156.238 |
2020-01-01 09:21:24 |
111.204.157.197 | attackbotsspam | Jan 1 05:53:28 silence02 sshd[30115]: Failed password for backup from 111.204.157.197 port 35261 ssh2 Jan 1 05:56:00 silence02 sshd[30230]: Failed password for mysql from 111.204.157.197 port 44378 ssh2 |
2020-01-01 13:08:12 |
159.203.139.128 | attackspambots | Jan 1 05:58:35 lnxded64 sshd[27379]: Failed password for root from 159.203.139.128 port 57768 ssh2 Jan 1 05:58:35 lnxded64 sshd[27379]: Failed password for root from 159.203.139.128 port 57768 ssh2 |
2020-01-01 13:12:27 |
80.211.9.126 | attackbots | Jan 1 05:58:49 lnxded64 sshd[27400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.9.126 |
2020-01-01 13:07:19 |
85.237.35.86 | attack | Automatic report - Port Scan Attack |
2020-01-01 13:03:15 |
198.108.67.53 | attack | Dec 31 23:49:38 debian-2gb-nbg1-2 kernel: \[91911.375830\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=37 ID=10199 PROTO=TCP SPT=8721 DPT=8200 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-01 09:13:12 |