City: unknown
Region: unknown
Country: Netherlands
Internet Service Provider: University of Twente
Hostname: unknown
Organization: unknown
Usage Type: University/College/School
Type | Details | Datetime |
---|---|---|
attackbots | Port scan on 1 port(s): 53 |
2020-04-28 01:12:56 |
attackspambots | Port scan on 1 port(s): 53 |
2020-04-11 03:25:51 |
IP | Type | Details | Datetime |
---|---|---|---|
145.102.6.73 | attackspam | Port scan on 1 port(s): 53 |
2020-06-25 03:23:48 |
145.102.6.58 | attackspam | Port scan on 1 port(s): 53 |
2020-06-25 03:15:42 |
145.102.6.49 | attackbots | Port scan on 1 port(s): 53 |
2020-06-25 03:01:10 |
145.102.6.49 | attack | Port scan on 1 port(s): 53 |
2020-05-16 22:39:45 |
145.102.6.86 | attackspambots | Port scan on 1 port(s): 53 |
2020-05-16 22:39:01 |
145.102.6.57 | attack | Port scan on 1 port(s): 53 |
2020-04-28 01:12:42 |
145.102.6.58 | attackbotsspam | Port scan on 1 port(s): 53 |
2020-04-28 01:10:27 |
145.102.6.49 | attack | Port scan on 1 port(s): 53 |
2020-04-19 23:38:00 |
145.102.6.73 | attackspam | Port scan on 1 port(s): 53 |
2020-04-19 23:37:49 |
145.102.6.57 | attackbotsspam | Port scan on 1 port(s): 53 |
2020-04-11 03:33:54 |
145.102.6.86 | attack | Port scan on 1 port(s): 53 |
2020-04-11 03:33:36 |
145.102.6.73 | attackspam | Port scan detected on * |
2020-03-21 05:29:57 |
145.102.6.55 | attackbots | Port scan on 1 port(s): 53 |
2020-03-19 21:23:10 |
145.102.6.57 | attack | Port scan on 1 port(s): 53 |
2020-02-20 22:37:44 |
145.102.6.57 | attackspam | Port scan on 1 port(s): 53 |
2020-02-17 23:32:20 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.102.6.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.102.6.46. IN A
;; AUTHORITY SECTION:
. 135 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020041001 1800 900 604800 86400
;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 03:25:41 CST 2020
;; MSG SIZE rcvd: 116
46.6.102.145.in-addr.arpa domain name pointer please.visit.www.openintel.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
46.6.102.145.in-addr.arpa name = please.visit.www.openintel.nl.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
81.70.15.226 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-10-13 12:59:00 |
158.69.88.77 | attackbots | Oct 13 03:08:43 scw-tender-jepsen sshd[15743]: Failed password for root from 158.69.88.77 port 32560 ssh2 Oct 13 04:37:11 scw-tender-jepsen sshd[17461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.88.77 |
2020-10-13 13:34:17 |
123.206.216.65 | attackspam | Oct 13 10:03:10 gw1 sshd[19588]: Failed password for root from 123.206.216.65 port 58854 ssh2 ... |
2020-10-13 13:18:25 |
78.157.40.106 | attackspambots | $f2bV_matches |
2020-10-13 12:55:33 |
45.129.33.13 | attack | Oct 13 06:47:20 [host] kernel: [2896351.783193] [U Oct 13 06:52:10 [host] kernel: [2896642.481625] [U Oct 13 06:52:55 [host] kernel: [2896686.843589] [U Oct 13 06:56:55 [host] kernel: [2896926.613356] [U Oct 13 07:20:58 [host] kernel: [2898369.584814] [U Oct 13 07:22:08 [host] kernel: [2898440.402633] [U |
2020-10-13 13:27:24 |
203.3.84.204 | attackspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-10-13 13:07:39 |
106.13.196.51 | attackspambots | Oct 13 06:59:41 host2 sshd[95972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.196.51 user=root Oct 13 06:59:42 host2 sshd[95972]: Failed password for root from 106.13.196.51 port 45412 ssh2 Oct 13 07:03:10 host2 sshd[96589]: Invalid user sorin from 106.13.196.51 port 58764 Oct 13 07:03:10 host2 sshd[96589]: Invalid user sorin from 106.13.196.51 port 58764 ... |
2020-10-13 13:28:56 |
104.155.213.9 | attack | Oct 12 18:12:48 eddieflores sshd\[19806\]: Invalid user ronald from 104.155.213.9 Oct 12 18:12:48 eddieflores sshd\[19806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.213.9 Oct 12 18:12:50 eddieflores sshd\[19806\]: Failed password for invalid user ronald from 104.155.213.9 port 52074 ssh2 Oct 12 18:16:40 eddieflores sshd\[20077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.213.9 user=root Oct 12 18:16:42 eddieflores sshd\[20077\]: Failed password for root from 104.155.213.9 port 55856 ssh2 |
2020-10-13 13:14:57 |
122.51.179.14 | attackspam | 2020-10-13T01:30:00.964901mail0 sshd[29092]: User root from 122.51.179.14 not allowed because not listed in AllowUsers 2020-10-13T01:30:02.743815mail0 sshd[29092]: Failed password for invalid user root from 122.51.179.14 port 52828 ssh2 2020-10-13T01:31:26.075977mail0 sshd[29136]: User root from 122.51.179.14 not allowed because not listed in AllowUsers ... |
2020-10-13 13:05:19 |
218.92.0.173 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-10-13 13:28:43 |
51.75.126.115 | attackspam | ssh brute force |
2020-10-13 13:12:35 |
218.92.0.223 | attackspam | 2020-10-13T05:15:58.274060abusebot-6.cloudsearch.cf sshd[31858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root 2020-10-13T05:16:00.734035abusebot-6.cloudsearch.cf sshd[31858]: Failed password for root from 218.92.0.223 port 40516 ssh2 2020-10-13T05:16:04.513025abusebot-6.cloudsearch.cf sshd[31858]: Failed password for root from 218.92.0.223 port 40516 ssh2 2020-10-13T05:15:58.274060abusebot-6.cloudsearch.cf sshd[31858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root 2020-10-13T05:16:00.734035abusebot-6.cloudsearch.cf sshd[31858]: Failed password for root from 218.92.0.223 port 40516 ssh2 2020-10-13T05:16:04.513025abusebot-6.cloudsearch.cf sshd[31858]: Failed password for root from 218.92.0.223 port 40516 ssh2 2020-10-13T05:15:58.274060abusebot-6.cloudsearch.cf sshd[31858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho ... |
2020-10-13 13:24:28 |
61.164.47.132 | attackspambots | Oct 12 22:01:41 propaganda sshd[117072]: Connection from 61.164.47.132 port 49474 on 10.0.0.161 port 22 rdomain "" Oct 12 22:01:41 propaganda sshd[117072]: Connection closed by 61.164.47.132 port 49474 [preauth] |
2020-10-13 13:06:39 |
37.49.230.238 | attackbots | 2020-10-13T06:44:21.356144news0 auth[956]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=admin rhost=37.49.230.238 2020-10-13T06:44:25.395781news0 dovecot[21131]: pop3-login: Aborted login (auth failed, 1 attempts in 4 secs): user= |
2020-10-13 13:11:33 |
157.230.122.80 | attackbots | web-1 [ssh] SSH Attack |
2020-10-13 12:56:27 |