City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.12.2.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.12.2.81. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 22:02:34 CST 2025
;; MSG SIZE rcvd: 104
Host 81.2.12.145.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.2.12.145.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 152.242.68.211 | attackspambots | pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.242.68.211 Invalid user ubnt from 152.242.68.211 port 2523 Failed password for invalid user ubnt from 152.242.68.211 port 2523 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.242.68.211 user=root Failed password for root from 152.242.68.211 port 2524 ssh2 |
2020-06-07 18:53:41 |
| 157.7.138.240 | attack | Host Scan |
2020-06-07 19:08:59 |
| 103.235.170.162 | attackspam | 2020-03-31T10:28:55.021320suse-nuc sshd[8213]: User root from 103.235.170.162 not allowed because listed in DenyUsers ... |
2020-06-07 18:50:39 |
| 81.223.62.230 | attack | Jun 7 06:41:32 lukav-desktop sshd\[6590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.223.62.230 user=root Jun 7 06:41:34 lukav-desktop sshd\[6590\]: Failed password for root from 81.223.62.230 port 49740 ssh2 Jun 7 06:43:20 lukav-desktop sshd\[6616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.223.62.230 user=root Jun 7 06:43:22 lukav-desktop sshd\[6616\]: Failed password for root from 81.223.62.230 port 49814 ssh2 Jun 7 06:47:31 lukav-desktop sshd\[6694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.223.62.230 user=root |
2020-06-07 19:05:33 |
| 91.185.186.213 | attackspam | Jun 7 10:48:11 piServer sshd[30920]: Failed password for root from 91.185.186.213 port 42936 ssh2 Jun 7 10:51:30 piServer sshd[31282]: Failed password for root from 91.185.186.213 port 43584 ssh2 ... |
2020-06-07 18:43:20 |
| 178.62.0.215 | attack | SSH Brute-Force reported by Fail2Ban |
2020-06-07 19:07:42 |
| 42.113.110.27 | attackbotsspam | 1591501679 - 06/07/2020 05:47:59 Host: 42.113.110.27/42.113.110.27 Port: 445 TCP Blocked |
2020-06-07 18:49:47 |
| 129.211.38.207 | attackbotsspam | Jun 7 12:45:39 mout sshd[31768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root Jun 7 12:45:41 mout sshd[31768]: Failed password for root from 129.211.38.207 port 54870 ssh2 |
2020-06-07 18:56:01 |
| 195.54.161.26 | attackspambots | Jun 7 08:29:00 debian-2gb-nbg1-2 kernel: \[13770085.396481\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.161.26 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=16118 PROTO=TCP SPT=59850 DPT=1652 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-07 19:07:23 |
| 218.92.0.212 | attackspambots | Jun 7 07:43:12 firewall sshd[8153]: Failed password for root from 218.92.0.212 port 32298 ssh2 Jun 7 07:43:16 firewall sshd[8153]: Failed password for root from 218.92.0.212 port 32298 ssh2 Jun 7 07:43:19 firewall sshd[8153]: Failed password for root from 218.92.0.212 port 32298 ssh2 ... |
2020-06-07 19:00:35 |
| 195.158.8.206 | attack | Jun 7 09:07:54 ws26vmsma01 sshd[163458]: Failed password for root from 195.158.8.206 port 38678 ssh2 ... |
2020-06-07 18:30:55 |
| 134.17.94.69 | attackspam | Brute-force attempt banned |
2020-06-07 18:49:26 |
| 113.160.45.174 | attackbots | Unauthorized connection attempt from IP address 113.160.45.174 on port 993 |
2020-06-07 18:31:23 |
| 209.141.53.10 | attackbots | Jun 1 10:45:08 mxgate1 sshd[20407]: Connection closed by 209.141.53.10 port 56126 [preauth] Jun 1 10:45:12 mxgate1 sshd[20409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.53.10 user=sshd Jun 1 10:45:14 mxgate1 sshd[20409]: Failed password for sshd from 209.141.53.10 port 56380 ssh2 Jun 1 10:45:15 mxgate1 sshd[20409]: Failed password for sshd from 209.141.53.10 port 56380 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=209.141.53.10 |
2020-06-07 18:35:46 |
| 111.229.100.48 | attackspambots | 111.229.100.48 - - [07/Jun/2020:02:40:44 -0700] "GET /TP/public/index.php HTTP/1.1" 404 111.229.100.48 - - [07/Jun/2020:02:40:46 -0700] "GET /TP/index.php HTTP/1.1" 404 111.229.100.48 - - [07/Jun/2020:02:40:46 -0700] "GET /thinkphp/html/public/index.php HTTP/1.1" 404 |
2020-06-07 18:58:34 |