City: Saint John
Region: New Brunswick
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.139.148.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.139.148.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:04:38 CST 2025
;; MSG SIZE rcvd: 107
Host 91.148.139.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.148.139.142.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
113.125.60.208 | attackbots | Nov 16 23:54:31 sso sshd[27638]: Failed password for bin from 113.125.60.208 port 47396 ssh2 Nov 16 23:58:38 sso sshd[28092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.60.208 ... |
2019-11-17 07:54:17 |
128.1.42.126 | attack | SASL broute force |
2019-11-17 08:00:01 |
92.118.38.38 | attackspambots | Nov 17 00:43:22 vmanager6029 postfix/smtpd\[17673\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 17 00:43:58 vmanager6029 postfix/smtpd\[17673\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-17 07:48:16 |
51.75.52.241 | attack | Nov 17 01:48:46 microserver sshd[8407]: Invalid user moriguchi from 51.75.52.241 port 43490 Nov 17 01:48:46 microserver sshd[8407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.241 Nov 17 01:48:47 microserver sshd[8407]: Failed password for invalid user moriguchi from 51.75.52.241 port 43490 ssh2 Nov 17 01:53:17 microserver sshd[9065]: Invalid user transki from 51.75.52.241 port 58062 Nov 17 01:53:17 microserver sshd[9065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.241 Nov 17 02:07:12 microserver sshd[11006]: Invalid user guest3 from 51.75.52.241 port 54612 Nov 17 02:07:12 microserver sshd[11006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.241 Nov 17 02:07:14 microserver sshd[11006]: Failed password for invalid user guest3 from 51.75.52.241 port 54612 ssh2 Nov 17 02:10:47 microserver sshd[11628]: pam_unix(sshd:auth): authentication failure; logname= u |
2019-11-17 07:59:01 |
49.235.214.68 | attackbotsspam | 2019-11-16T23:45:21.362635shield sshd\[14668\]: Invalid user jahari from 49.235.214.68 port 50224 2019-11-16T23:45:21.367060shield sshd\[14668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68 2019-11-16T23:45:23.320116shield sshd\[14668\]: Failed password for invalid user jahari from 49.235.214.68 port 50224 ssh2 2019-11-16T23:49:56.369273shield sshd\[15805\]: Invalid user grohler from 49.235.214.68 port 56504 2019-11-16T23:49:56.372326shield sshd\[15805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.214.68 |
2019-11-17 07:57:25 |
85.104.8.180 | attack | Automatic report - Banned IP Access |
2019-11-17 08:21:16 |
46.38.144.179 | attackbotsspam | Nov 17 00:55:08 webserver postfix/smtpd\[27953\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 17 00:56:18 webserver postfix/smtpd\[27953\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 17 00:57:26 webserver postfix/smtpd\[25639\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 17 00:58:39 webserver postfix/smtpd\[28458\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 17 00:59:51 webserver postfix/smtpd\[28458\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-17 08:00:45 |
180.249.105.214 | attack | Automatic report - Port Scan Attack |
2019-11-17 08:02:22 |
189.126.199.194 | attackbotsspam | Nov 14 15:43:54 ihweb003 sshd[26527]: Connection from 189.126.199.194 port 56904 on 139.59.173.177 port 22 Nov 14 15:43:54 ihweb003 sshd[26527]: Did not receive identification string from 189.126.199.194 port 56904 Nov 14 15:49:24 ihweb003 sshd[27581]: Connection from 189.126.199.194 port 47256 on 139.59.173.177 port 22 Nov 14 15:49:25 ihweb003 sshd[27581]: Address 189.126.199.194 maps to mail.acsc.org.br, but this does not map back to the address. Nov 14 15:49:25 ihweb003 sshd[27581]: User r.r from 189.126.199.194 not allowed because none of user's groups are listed in AllowGroups Nov 14 15:49:25 ihweb003 sshd[27581]: Received disconnect from 189.126.199.194 port 47256:11: Normal Shutdown, Thank you for playing [preauth] Nov 14 15:49:25 ihweb003 sshd[27581]: Disconnected from 189.126.199.194 port 47256 [preauth] Nov 14 15:51:17 ihweb003 sshd[28015]: Connection from 189.126.199.194 port 44478 on 139.59.173.177 port 22 Nov 14 15:51:18 ihweb003 sshd[28015]: Address 189.12........ ------------------------------- |
2019-11-17 08:06:30 |
182.84.124.169 | attackspambots | Nov 16 12:56:52 XXX sshd[13173]: Invalid user pi from 182.84.124.169 port 58832 |
2019-11-17 08:15:32 |
212.109.220.201 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-11-17 08:13:54 |
93.114.82.114 | attackspam | Nov 16 23:40:22 server2101 sshd[3977]: Invalid user meissler from 93.114.82.114 port 40172 Nov 16 23:40:22 server2101 sshd[3977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.114.82.114 Nov 16 23:40:24 server2101 sshd[3977]: Failed password for invalid user meissler from 93.114.82.114 port 40172 ssh2 Nov 16 23:40:24 server2101 sshd[3977]: Received disconnect from 93.114.82.114 port 40172:11: Bye Bye [preauth] Nov 16 23:40:24 server2101 sshd[3977]: Disconnected from 93.114.82.114 port 40172 [preauth] Nov 16 23:49:44 server2101 sshd[4094]: Invalid user elgvad from 93.114.82.114 port 41088 Nov 16 23:49:44 server2101 sshd[4094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.114.82.114 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.114.82.114 |
2019-11-17 08:11:29 |
182.61.40.17 | attackbotsspam | Nov 16 13:28:25 hpm sshd\[23774\]: Invalid user uli from 182.61.40.17 Nov 16 13:28:25 hpm sshd\[23774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.17 Nov 16 13:28:27 hpm sshd\[23774\]: Failed password for invalid user uli from 182.61.40.17 port 40968 ssh2 Nov 16 13:32:49 hpm sshd\[24119\]: Invalid user 120485 from 182.61.40.17 Nov 16 13:32:49 hpm sshd\[24119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.17 |
2019-11-17 07:46:41 |
110.173.50.50 | attackspambots | Nov 17 00:54:21 www4 sshd\[62950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.173.50.50 user=root Nov 17 00:54:24 www4 sshd\[62950\]: Failed password for root from 110.173.50.50 port 42812 ssh2 Nov 17 00:58:05 www4 sshd\[63396\]: Invalid user Martta from 110.173.50.50 ... |
2019-11-17 08:10:12 |
131.221.161.16 | attackbotsspam | port 23 attempt blocked |
2019-11-17 08:11:01 |