City: unknown
Region: unknown
Country: Panama
Internet Service Provider: FlyServers S.A.
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackspam | Jul 31 01:46:09 mail.srvfarm.net postfix/smtpd[90051]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 31 01:46:09 mail.srvfarm.net postfix/smtpd[90037]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 31 01:46:09 mail.srvfarm.net postfix/smtpd[90051]: lost connection after AUTH from unknown[141.98.80.54] Jul 31 01:46:09 mail.srvfarm.net postfix/smtpd[90037]: lost connection after AUTH from unknown[141.98.80.54] Jul 31 01:46:12 mail.srvfarm.net postfix/smtpd[90054]: lost connection after AUTH from unknown[141.98.80.54] |
2020-07-31 08:10:07 |
| attack | spam (f2b h2) |
2020-07-31 00:22:54 |
| attackbots | Jul 30 11:38:59 relay postfix/smtpd\[17294\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 30 11:39:17 relay postfix/smtpd\[4055\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 30 11:41:21 relay postfix/smtpd\[17294\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 30 11:41:40 relay postfix/smtpd\[17293\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 30 11:43:31 relay postfix/smtpd\[19885\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-30 18:12:51 |
| attackspambots | Jul 27 02:03:23 mail.srvfarm.net postfix/smtps/smtpd[1616333]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 27 02:03:23 mail.srvfarm.net postfix/smtps/smtpd[1616333]: lost connection after AUTH from unknown[141.98.80.54] Jul 27 02:03:29 mail.srvfarm.net postfix/smtps/smtpd[1616536]: lost connection after AUTH from unknown[141.98.80.54] Jul 27 02:03:30 mail.srvfarm.net postfix/smtps/smtpd[1617816]: lost connection after AUTH from unknown[141.98.80.54] Jul 27 02:03:35 mail.srvfarm.net postfix/smtps/smtpd[1617814]: lost connection after AUTH from unknown[141.98.80.54] |
2020-07-27 08:20:08 |
| attack | 2020-07-26 06:12:30 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data \(set_id=info@jugend-ohne-grenzen.net\) 2020-07-26 06:12:37 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data 2020-07-26 06:12:46 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data 2020-07-26 06:12:50 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data 2020-07-26 06:13:02 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data 2020-07-26 06:13:07 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data 2020-07-26 06:13:11 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data 2020-07-26 06:13:16 dovecot_login au ... |
2020-07-26 12:25:56 |
| attackbotsspam | Time: Fri Jun 28 19:20:21 2019 -0400 IP: 141.98.80.54 (PA/Panama/-) Failures: 5 (smtpauth) Interval: 3600 seconds Blocked: Permanent Block |
2019-06-29 07:36:04 |
| attackbotsspam | 'IP reached maximum auth failures for a one day block' |
2019-06-29 05:44:56 |
| attack | Jun 27 01:54:47 mail postfix/smtpd\[18755\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 27 01:54:58 mail postfix/smtpd\[18755\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 27 02:05:43 mail postfix/smtpd\[18548\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-27 08:47:58 |
| attackbotsspam | Jun 25 21:14:04 mail postfix/smtpd\[28328\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 25 21:14:29 mail postfix/smtpd\[29597\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 25 21:14:59 mail postfix/smtpd\[28328\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-26 04:13:02 |
| attackbots | 2019-06-24 14:06:35 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data \(set_id=no-reply@opso.it\) 2019-06-24 14:06:47 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data \(set_id=no-reply\) 2019-06-24 14:11:23 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data \(set_id=no-reply@opso.it\) 2019-06-24 14:11:40 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data \(set_id=no-reply\) 2019-06-24 14:15:49 dovecot_login authenticator failed for \(\[141.98.80.54\]\) \[141.98.80.54\]: 535 Incorrect authentication data \(set_id=sales@opso.it\) |
2019-06-24 21:38:08 |
| attackbots | Jun 23 23:57:38 mail postfix/smtpd\[7782\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 00:39:17 mail postfix/smtpd\[8813\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 00:39:25 mail postfix/smtpd\[8813\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 00:44:32 mail postfix/smtpd\[8956\]: warning: unknown\[141.98.80.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-06-24 06:43:45 |
| attackbots | Jun 22 21:17:01 mail postfix/smtpd[22544]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 22 21:17:12 mail postfix/smtpd[22544]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 22 21:24:31 mail postfix/smtpd[22559]: warning: unknown[141.98.80.54]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-06-23 03:46:13 |
| attackspam | dovecot jail smtp auth [ti] |
2019-06-22 15:16:24 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 141.98.80.73 | attackbotsspam | Oct 13 20:36:42 mail postfix/smtpd\[2755\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 13 21:07:45 mail postfix/smtpd\[3739\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 13 21:08:05 mail postfix/smtpd\[3743\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 13 21:08:21 mail postfix/smtpd\[3743\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-10-14 03:24:10 |
| 141.98.80.73 | attack | Oct 13 12:10:32 mail postfix/smtpd\[17486\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 13 12:10:52 mail postfix/smtpd\[17603\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 13 12:11:11 mail postfix/smtpd\[17486\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 13 12:42:04 mail postfix/smtpd\[18268\]: warning: unknown\[141.98.80.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-10-13 18:42:16 |
| 141.98.80.72 | attackbotsspam | 2020-10-11 20:00:28 dovecot_login authenticator failed for \(\[141.98.80.72\]\) \[141.98.80.72\]: 535 Incorrect authentication data \(set_id=ben@benjaminhauck.com\) 2020-10-11 20:00:36 dovecot_login authenticator failed for \(\[141.98.80.72\]\) \[141.98.80.72\]: 535 Incorrect authentication data 2020-10-11 20:00:45 dovecot_login authenticator failed for \(\[141.98.80.72\]\) \[141.98.80.72\]: 535 Incorrect authentication data 2020-10-11 20:00:51 dovecot_login authenticator failed for \(\[141.98.80.72\]\) \[141.98.80.72\]: 535 Incorrect authentication data 2020-10-11 20:01:03 dovecot_login authenticator failed for \(\[141.98.80.72\]\) \[141.98.80.72\]: 535 Incorrect authentication data ... |
2020-10-12 02:02:30 |
| 141.98.80.22 | attackbots | Fail2Ban Ban Triggered |
2020-10-12 00:23:22 |
| 141.98.80.72 | attackbotsspam | Brute Force attack - banned by Fail2Ban |
2020-10-11 17:52:34 |
| 141.98.80.22 | attackbotsspam | [H1.VM1] Blocked by UFW |
2020-10-11 16:21:12 |
| 141.98.80.22 | attackbots | port scan hacking |
2020-10-11 09:40:14 |
| 141.98.80.22 | attack | Tried to scan TCP Port but the Antivirus refused. More than 20 times within a few months. |
2020-10-11 07:04:39 |
| 141.98.80.39 | attackbotsspam | \x03 400 0 "-" "-" |
2020-10-10 02:08:44 |
| 141.98.80.39 | attack | Found on Binary Defense / proto=6 . srcport=65528 . dstport=53 DNS . (757) |
2020-10-09 17:53:14 |
| 141.98.80.190 | attackspambots | Exim brute force attack (multiple auth failures). |
2020-10-09 07:22:48 |
| 141.98.80.22 | attackspambots | UTC 10/08/2020 18:12:24 - 83 - Security Services - Alert - 141.98.80.22, 65534, X1 - xxx.xxx.xxx.xxx, 8651, X1 - tcp - TCP scanned port list, 8691, 8611, 8671, 8601, 8661, 8641, 8681, 8631, 8621, 8651 - Probable port scan detected |
2020-10-09 05:32:34 |
| 141.98.80.190 | attackbots | Oct 8 17:35:05 relay postfix/smtpd\[8860\]: warning: unknown\[141.98.80.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 17:35:26 relay postfix/smtpd\[4144\]: warning: unknown\[141.98.80.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 17:40:26 relay postfix/smtpd\[5072\]: warning: unknown\[141.98.80.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 17:40:45 relay postfix/smtpd\[4145\]: warning: unknown\[141.98.80.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 8 17:46:12 relay postfix/smtpd\[8861\]: warning: unknown\[141.98.80.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-08 23:51:58 |
| 141.98.80.22 | attackbotsspam | scans 10 times in preceeding hours on the ports (in chronological order) 8601 8611 8621 8631 8641 8651 8661 8671 8681 8691 |
2020-10-08 21:47:16 |
| 141.98.80.22 | attack | tcp port scan |
2020-10-08 13:41:46 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.98.80.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49929
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.98.80.54. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061801 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 19 06:42:39 CST 2019
;; MSG SIZE rcvd: 116
Host 54.80.98.141.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 54.80.98.141.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.23.79.3 | attack | Automatic report - Banned IP Access |
2019-09-03 16:52:32 |
| 222.186.15.160 | attackbotsspam | Sep 3 10:45:26 ubuntu-2gb-nbg1-dc3-1 sshd[10005]: Failed password for root from 222.186.15.160 port 59882 ssh2 Sep 3 10:45:30 ubuntu-2gb-nbg1-dc3-1 sshd[10005]: error: maximum authentication attempts exceeded for root from 222.186.15.160 port 59882 ssh2 [preauth] ... |
2019-09-03 16:49:29 |
| 89.254.148.26 | attack | Sep 2 22:22:40 aiointranet sshd\[17893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.254.148.26 user=root Sep 2 22:22:42 aiointranet sshd\[17893\]: Failed password for root from 89.254.148.26 port 42614 ssh2 Sep 2 22:26:37 aiointranet sshd\[18189\]: Invalid user hyperic from 89.254.148.26 Sep 2 22:26:37 aiointranet sshd\[18189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.254.148.26 Sep 2 22:26:39 aiointranet sshd\[18189\]: Failed password for invalid user hyperic from 89.254.148.26 port 58074 ssh2 |
2019-09-03 16:38:23 |
| 91.121.157.83 | attackbotsspam | Sep 3 04:07:31 ny01 sshd[8620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83 Sep 3 04:07:33 ny01 sshd[8620]: Failed password for invalid user sub from 91.121.157.83 port 41232 ssh2 Sep 3 04:11:15 ny01 sshd[9314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83 |
2019-09-03 16:27:28 |
| 178.208.113.74 | attackbotsspam | Sep 3 04:47:14 OPSO sshd\[4816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.208.113.74 user=root Sep 3 04:47:16 OPSO sshd\[4816\]: Failed password for root from 178.208.113.74 port 40498 ssh2 Sep 3 04:53:14 OPSO sshd\[5846\]: Invalid user pentagon from 178.208.113.74 port 56512 Sep 3 04:53:14 OPSO sshd\[5846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.208.113.74 Sep 3 04:53:16 OPSO sshd\[5846\]: Failed password for invalid user pentagon from 178.208.113.74 port 56512 ssh2 |
2019-09-03 16:03:02 |
| 67.227.79.117 | attackspambots | (From darren@tailoredaerialpics.com) Hi Aerial Impressions will be photographing businesses and homes in throughout a large part of the USA from Sept 10th. We shoot 30+ images from various aspects from an airplane (we do not use drones) and deliver digitally free from any copyright. Only $249 per location. For more info, schedule and bookings please visit www.tailoredaerialpics.com Or call 877 533 9003 Regards Aerial Impressions |
2019-09-03 16:19:28 |
| 124.160.102.196 | attack | Reported by AbuseIPDB proxy server. |
2019-09-03 16:05:43 |
| 174.140.249.49 | attackbots | (From darren@tailoredaerialpics.com) Hi Aerial Impressions will be photographing businesses and homes in throughout a large part of the USA from Sept 10th. We shoot 30+ images from various aspects from an airplane (we do not use drones) and deliver digitally free from any copyright. Only $249 per location. For more info, schedule and bookings please visit www.tailoredaerialpics.com Or call 877 533 9003 Regards Aerial Impressions |
2019-09-03 16:15:07 |
| 85.37.38.195 | attackspambots | Sep 3 10:45:59 pkdns2 sshd\[40598\]: Invalid user tmp from 85.37.38.195Sep 3 10:46:02 pkdns2 sshd\[40598\]: Failed password for invalid user tmp from 85.37.38.195 port 17311 ssh2Sep 3 10:50:18 pkdns2 sshd\[40798\]: Invalid user storm from 85.37.38.195Sep 3 10:50:20 pkdns2 sshd\[40798\]: Failed password for invalid user storm from 85.37.38.195 port 31562 ssh2Sep 3 10:54:35 pkdns2 sshd\[40938\]: Invalid user bronson from 85.37.38.195Sep 3 10:54:37 pkdns2 sshd\[40938\]: Failed password for invalid user bronson from 85.37.38.195 port 12787 ssh2 ... |
2019-09-03 16:09:29 |
| 84.201.138.240 | attack | RDP Brute-Force (Grieskirchen RZ2) |
2019-09-03 15:59:01 |
| 190.78.170.177 | attackbotsspam | 445/tcp [2019-09-03]1pkt |
2019-09-03 16:39:00 |
| 103.72.163.222 | attackspam | Sep 3 08:25:01 web8 sshd\[17616\]: Invalid user user from 103.72.163.222 Sep 3 08:25:01 web8 sshd\[17616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.163.222 Sep 3 08:25:03 web8 sshd\[17616\]: Failed password for invalid user user from 103.72.163.222 port 18871 ssh2 Sep 3 08:29:46 web8 sshd\[20602\]: Invalid user production from 103.72.163.222 Sep 3 08:29:46 web8 sshd\[20602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.163.222 |
2019-09-03 16:34:35 |
| 123.138.18.35 | attackbots | Sep 3 10:22:36 mail sshd\[9733\]: Invalid user user from 123.138.18.35 port 32772 Sep 3 10:22:36 mail sshd\[9733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35 Sep 3 10:22:38 mail sshd\[9733\]: Failed password for invalid user user from 123.138.18.35 port 32772 ssh2 Sep 3 10:26:12 mail sshd\[10340\]: Invalid user appman from 123.138.18.35 port 47278 Sep 3 10:26:12 mail sshd\[10340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35 |
2019-09-03 16:30:42 |
| 185.206.225.143 | attackbotsspam | Name: Robertfew E-Mail: dmb1868@yahoo.com Subject: Hei?e Girls auf der Suche nach Sex in deiner Stadt Message: Lerne jetzt ein sexy Madchen kennen: https://chogoon.com/srt/vu7a4?&zzubl=dzCRsWK2SVHD |
2019-09-03 16:22:45 |
| 114.67.66.199 | attackbots | Sep 3 08:10:56 *** sshd[1123]: User root from 114.67.66.199 not allowed because not listed in AllowUsers |
2019-09-03 16:39:15 |