City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.52.18.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.52.18.8. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:36:06 CST 2025
;; MSG SIZE rcvd: 104
Host 8.18.52.145.in-addr.arpa not found: 2(SERVFAIL)
server can't find 145.52.18.8.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.145.13.111 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-09-08 02:47:18 |
| 2a01:4f8:121:40b6::2 | attack | HTTP DDOS |
2020-09-08 02:37:03 |
| 54.38.53.251 | attackspambots | Sep 7 18:24:25 vm1 sshd[6103]: Failed password for root from 54.38.53.251 port 37014 ssh2 ... |
2020-09-08 02:19:32 |
| 139.59.92.19 | attackspambots |
|
2020-09-08 02:43:17 |
| 116.237.110.248 | attack | Sep 7 20:06:51 plg sshd[8814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.110.248 Sep 7 20:06:53 plg sshd[8814]: Failed password for invalid user 123abc from 116.237.110.248 port 48484 ssh2 Sep 7 20:08:39 plg sshd[8825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.110.248 user=root Sep 7 20:08:41 plg sshd[8825]: Failed password for invalid user root from 116.237.110.248 port 33638 ssh2 Sep 7 20:10:41 plg sshd[8894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.110.248 Sep 7 20:10:44 plg sshd[8894]: Failed password for invalid user freedom from 116.237.110.248 port 47020 ssh2 ... |
2020-09-08 02:23:05 |
| 158.69.199.225 | attack | (sshd) Failed SSH login from 158.69.199.225 (CA/Canada/225.ip-158-69-199.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 7 12:17:12 server sshd[7224]: Failed password for root from 158.69.199.225 port 51791 ssh2 Sep 7 12:27:20 server sshd[12438]: Failed password for root from 158.69.199.225 port 47252 ssh2 Sep 7 12:34:47 server sshd[16219]: Failed password for root from 158.69.199.225 port 50882 ssh2 Sep 7 12:41:54 server sshd[21586]: Failed password for root from 158.69.199.225 port 54504 ssh2 Sep 7 12:48:59 server sshd[27884]: Failed password for root from 158.69.199.225 port 58085 ssh2 |
2020-09-08 02:21:47 |
| 131.108.158.227 | attack | Autoban 131.108.158.227 AUTH/CONNECT |
2020-09-08 02:36:43 |
| 104.248.237.70 | attack | (sshd) Failed SSH login from 104.248.237.70 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 7 14:00:35 server sshd[26773]: Invalid user rso from 104.248.237.70 port 8739 Sep 7 14:00:37 server sshd[26773]: Failed password for invalid user rso from 104.248.237.70 port 8739 ssh2 Sep 7 14:10:41 server sshd[32632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.237.70 user=root Sep 7 14:10:44 server sshd[32632]: Failed password for root from 104.248.237.70 port 15781 ssh2 Sep 7 14:13:57 server sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.237.70 user=root |
2020-09-08 02:35:50 |
| 103.120.160.178 | attack | Wordpress attack |
2020-09-08 02:45:04 |
| 209.85.217.66 | attackbotsspam | Received: from 10.197.32.140 by atlas116.free.mail.bf1.yahoo.com with HTTP; Sat, 5 Sep 2020 18:48:07 +0000 Return-Path: |
2020-09-08 02:15:45 |
| 177.152.124.21 | attackspambots | Sep 7 10:52:00 myvps sshd[12591]: Failed password for root from 177.152.124.21 port 39302 ssh2 Sep 7 10:58:55 myvps sshd[17026]: Failed password for root from 177.152.124.21 port 43616 ssh2 Sep 7 11:03:23 myvps sshd[28760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.21 ... |
2020-09-08 02:39:30 |
| 195.136.141.13 | attackspam | Icarus honeypot on github |
2020-09-08 02:29:34 |
| 106.12.89.154 | attack | Sep 7 18:41:06 marvibiene sshd[54514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154 user=root Sep 7 18:41:09 marvibiene sshd[54514]: Failed password for root from 106.12.89.154 port 44188 ssh2 Sep 7 18:43:49 marvibiene sshd[56193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154 user=root Sep 7 18:43:51 marvibiene sshd[56193]: Failed password for root from 106.12.89.154 port 44220 ssh2 |
2020-09-08 02:49:12 |
| 1.193.160.164 | attack | Sep 7 08:33:32 fhem-rasp sshd[14531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.160.164 Sep 7 08:33:34 fhem-rasp sshd[14531]: Failed password for invalid user dbadmin from 1.193.160.164 port 33761 ssh2 ... |
2020-09-08 02:45:20 |
| 103.251.213.122 | attack | Unauthorised login to NAS |
2020-09-08 02:15:30 |