City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.143.103.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.143.103.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:07:40 CST 2025
;; MSG SIZE rcvd: 107
64.103.143.145.in-addr.arpa domain name pointer 145.143.EARLY-REGISTRATION.of.SURFnet.invalid.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
64.103.143.145.in-addr.arpa name = 145.143.EARLY-REGISTRATION.of.SURFnet.invalid.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 179.189.205.39 | attack | Sep 9 11:15:31 mail.srvfarm.net postfix/smtpd[2330263]: warning: unknown[179.189.205.39]: SASL PLAIN authentication failed: Sep 9 11:15:31 mail.srvfarm.net postfix/smtpd[2330263]: lost connection after AUTH from unknown[179.189.205.39] Sep 9 11:22:07 mail.srvfarm.net postfix/smtpd[2330266]: warning: unknown[179.189.205.39]: SASL PLAIN authentication failed: Sep 9 11:22:08 mail.srvfarm.net postfix/smtpd[2330266]: lost connection after AUTH from unknown[179.189.205.39] Sep 9 11:23:05 mail.srvfarm.net postfix/smtps/smtpd[2316064]: warning: unknown[179.189.205.39]: SASL PLAIN authentication failed: |
2020-09-12 01:18:44 |
| 125.64.94.133 | attackbotsspam | Telnet Server BruteForce Attack |
2020-09-12 01:42:52 |
| 95.141.142.46 | attack | 20/9/11@03:17:17: FAIL: Alarm-Intrusion address from=95.141.142.46 ... |
2020-09-12 01:46:16 |
| 45.142.120.93 | attackbots | Sep 7 01:35:42 nirvana postfix/smtpd[15112]: connect from unknown[45.142.120.93] Sep 7 01:35:47 nirvana postfix/smtpd[15112]: warning: unknown[45.142.120.93]: SASL LOGIN authentication failed: authentication failure Sep 7 01:35:48 nirvana postfix/smtpd[15112]: disconnect from unknown[45.142.120.93] Sep 7 01:35:50 nirvana postfix/smtpd[15112]: connect from unknown[45.142.120.93] Sep 7 01:35:53 nirvana postfix/smtpd[15117]: connect from unknown[45.142.120.93] Sep 7 01:35:53 nirvana postfix/smtpd[15118]: connect from unknown[45.142.120.93] Sep 7 01:35:54 nirvana postfix/smtpd[15116]: connect from unknown[45.142.120.93] Sep 7 01:35:55 nirvana postfix/smtpd[15112]: warning: unknown[45.142.120.93]: SASL LOGIN authentication failed: authentication failure Sep 7 01:35:56 nirvana postfix/smtpd[15112]: disconnect from unknown[45.142.120.93] Sep 7 01:35:57 nirvana postfix/smtpd[15116]: warning: unknown[45.142.120.93]: SASL LOGIN authentication failed: authentication fail........ ------------------------------- |
2020-09-12 01:27:08 |
| 45.142.120.179 | attackspam | Sep 9 04:19:52 web02.agentur-b-2.de postfix/smtpd[1652531]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:20:26 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:21:04 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:21:42 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:22:19 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-12 01:15:45 |
| 49.235.38.46 | attackbotsspam | 2020-09-10T23:50:31.240603ks3355764 sshd[5871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.38.46 user=root 2020-09-10T23:50:33.661693ks3355764 sshd[5871]: Failed password for root from 49.235.38.46 port 44814 ssh2 ... |
2020-09-12 01:55:33 |
| 91.134.173.100 | attack | reported through recidive - multiple failed attempts(SSH) |
2020-09-12 01:29:40 |
| 10.200.77.175 | attack | Received: from 10.200.77.175 by atlas103.free.mail.ir2.yahoo.com with HTTP; Thu, 10 Sep 2020 13:49:06 +0000 Return-Path: <010001747846e4ef-e82af807-a135-478d-9248-09afeae6110c-000000@amazonses.com> Received: from 54.240.11.157 (EHLO a11-157.smtp-out.amazonses.com) by 10.200.77.175 with SMTPs; Thu, 10 Sep 2020 13:49:06 +0000 X-Originating-Ip: [54.240.11.157] Received-SPF: pass (domain of amazonses.com designates 54.240.11.157 as permitted sender) Authentication-Results: atlas103.free.mail.ir2.yahoo.com; dkim=pass header.i=@amazonses.com header.s=224i4yxa5dv7c2xz3womw6peuasteono; spf=pass smtp.mailfrom=amazonses.com; dmarc=unknown X-Apparently-To: aftpriv@yahoo.de; Thu, 10 Sep 2020 13:49:06 +0000 |
2020-09-12 01:47:25 |
| 59.127.230.238 | attack | port scan and connect, tcp 23 (telnet) |
2020-09-12 01:56:07 |
| 40.118.226.96 | attack | Sep 11 17:39:17 sshgateway sshd\[17822\]: Invalid user admin from 40.118.226.96 Sep 11 17:39:17 sshgateway sshd\[17822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.226.96 Sep 11 17:39:19 sshgateway sshd\[17822\]: Failed password for invalid user admin from 40.118.226.96 port 56952 ssh2 |
2020-09-12 01:40:23 |
| 172.82.230.3 | attackbots | Sep 10 15:28:43 mail.srvfarm.net postfix/smtpd[3138890]: lost connection after STARTTLS from r3.news.eu.rvca.com[172.82.230.3] Sep 10 15:29:53 mail.srvfarm.net postfix/smtpd[3138891]: lost connection after STARTTLS from r3.news.eu.rvca.com[172.82.230.3] Sep 10 15:30:58 mail.srvfarm.net postfix/smtpd[3138895]: lost connection after STARTTLS from r3.news.eu.rvca.com[172.82.230.3] Sep 10 15:33:26 mail.srvfarm.net postfix/smtpd[3138895]: lost connection after STARTTLS from r3.news.eu.rvca.com[172.82.230.3] Sep 10 15:34:34 mail.srvfarm.net postfix/smtpd[3138895]: lost connection after STARTTLS from r3.news.eu.rvca.com[172.82.230.3] |
2020-09-12 01:21:14 |
| 118.89.229.84 | attackbots | Sep 11 16:17:21 sshgateway sshd\[6535\]: Invalid user developer from 118.89.229.84 Sep 11 16:17:21 sshgateway sshd\[6535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84 Sep 11 16:17:23 sshgateway sshd\[6535\]: Failed password for invalid user developer from 118.89.229.84 port 50548 ssh2 |
2020-09-12 01:31:14 |
| 168.194.154.123 | attack | Sep 8 05:10:25 mail.srvfarm.net postfix/smtps/smtpd[1598024]: warning: unknown[168.194.154.123]: SASL PLAIN authentication failed: Sep 8 05:10:25 mail.srvfarm.net postfix/smtps/smtpd[1598024]: lost connection after AUTH from unknown[168.194.154.123] Sep 8 05:16:10 mail.srvfarm.net postfix/smtps/smtpd[1600077]: warning: unknown[168.194.154.123]: SASL PLAIN authentication failed: Sep 8 05:16:11 mail.srvfarm.net postfix/smtps/smtpd[1600077]: lost connection after AUTH from unknown[168.194.154.123] Sep 8 05:16:31 mail.srvfarm.net postfix/smtps/smtpd[1597720]: warning: unknown[168.194.154.123]: SASL PLAIN authentication failed: |
2020-09-12 01:21:31 |
| 218.92.0.168 | attackbotsspam | Sep 11 19:32:56 abendstille sshd\[24195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Sep 11 19:32:58 abendstille sshd\[24195\]: Failed password for root from 218.92.0.168 port 16626 ssh2 Sep 11 19:33:16 abendstille sshd\[24472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Sep 11 19:33:18 abendstille sshd\[24472\]: Failed password for root from 218.92.0.168 port 51453 ssh2 Sep 11 19:33:21 abendstille sshd\[24472\]: Failed password for root from 218.92.0.168 port 51453 ssh2 ... |
2020-09-12 01:49:38 |
| 178.128.95.43 | attackspam | "Unauthorized connection attempt on SSHD detected" |
2020-09-12 01:33:49 |