City: unknown
Region: unknown
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.94.14.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;147.94.14.52. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:00:16 CST 2025
;; MSG SIZE rcvd: 105
52.14.94.147.in-addr.arpa domain name pointer eduroam-1-14-52.univ-amu.fr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
52.14.94.147.in-addr.arpa name = eduroam-1-14-52.univ-amu.fr.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.130.159.90 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/82.130.159.90/ ES - 1H : (10) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ES NAME ASN : ASN12338 IP : 82.130.159.90 CIDR : 82.130.128.0/17 PREFIX COUNT : 22 UNIQUE IP COUNT : 490240 ATTACKS DETECTED ASN12338 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2020-03-16 17:21:02 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2020-03-17 02:00:44 |
| 213.204.81.159 | attack | SSH brutforce |
2020-03-17 01:33:50 |
| 222.186.30.209 | attack | SSH brutforce |
2020-03-17 01:50:00 |
| 162.17.98.161 | attackbotsspam | SMTP |
2020-03-17 01:30:55 |
| 187.18.108.73 | attack | Mar 16 16:17:01 santamaria sshd\[5456\]: Invalid user gzx from 187.18.108.73 Mar 16 16:18:24 santamaria sshd\[5456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.108.73 Mar 16 16:18:26 santamaria sshd\[5456\]: Failed password for invalid user gzx from 187.18.108.73 port 60568 ssh2 ... |
2020-03-17 02:08:31 |
| 191.55.216.99 | attackbots | Mar 16 15:36:32 xxxxxxx0 sshd[2012]: Invalid user admin from 191.55.216.99 port 50004 Mar 16 15:36:32 xxxxxxx0 sshd[2012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.55.216.99 Mar 16 15:36:35 xxxxxxx0 sshd[2012]: Failed password for invalid user admin from 191.55.216.99 port 50004 ssh2 Mar 16 15:36:38 xxxxxxx0 sshd[2040]: Invalid user admin from 191.55.216.99 port 50010 Mar 16 15:36:38 xxxxxxx0 sshd[2040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.55.216.99 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=191.55.216.99 |
2020-03-17 01:53:25 |
| 118.27.16.74 | attackspambots | Mar 16 10:30:37 lanister sshd[19010]: Failed password for root from 118.27.16.74 port 60748 ssh2 Mar 16 10:36:33 lanister sshd[19085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.16.74 user=root Mar 16 10:36:36 lanister sshd[19085]: Failed password for root from 118.27.16.74 port 40690 ssh2 Mar 16 10:42:25 lanister sshd[19210]: Invalid user demo from 118.27.16.74 |
2020-03-17 02:09:55 |
| 103.146.203.12 | attack | Invalid user backup from 103.146.203.12 port 52676 |
2020-03-17 01:52:30 |
| 200.146.215.26 | attack | SSH Login Bruteforce |
2020-03-17 02:04:23 |
| 34.67.145.173 | attackbots | $f2bV_matches |
2020-03-17 01:46:07 |
| 112.85.42.173 | attack | Mar 16 07:15:01 php1 sshd\[5502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root Mar 16 07:15:02 php1 sshd\[5502\]: Failed password for root from 112.85.42.173 port 41573 ssh2 Mar 16 07:15:21 php1 sshd\[5528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root Mar 16 07:15:23 php1 sshd\[5528\]: Failed password for root from 112.85.42.173 port 5049 ssh2 Mar 16 07:15:44 php1 sshd\[5565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root |
2020-03-17 01:22:45 |
| 74.208.18.153 | attack | SSH Authentication Attempts Exceeded |
2020-03-17 01:52:56 |
| 14.225.11.25 | attack | Mar 16 12:41:56 lanister sshd[20909]: Failed password for root from 14.225.11.25 port 36746 ssh2 Mar 16 12:48:52 lanister sshd[20978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.11.25 user=root Mar 16 12:48:54 lanister sshd[20978]: Failed password for root from 14.225.11.25 port 48404 ssh2 Mar 16 12:55:34 lanister sshd[21045]: Invalid user store from 14.225.11.25 |
2020-03-17 01:23:12 |
| 134.209.46.135 | attack | DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks node-superagent/4.1.0 |
2020-03-17 01:54:44 |
| 39.36.58.160 | attack | Lines containing failures of 39.36.58.160 Mar 16 15:28:38 shared11 sshd[17970]: Invalid user user123 from 39.36.58.160 port 53162 Mar 16 15:28:39 shared11 sshd[17970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.36.58.160 Mar 16 15:28:41 shared11 sshd[17970]: Failed password for invalid user user123 from 39.36.58.160 port 53162 ssh2 Mar 16 15:28:41 shared11 sshd[17970]: Connection closed by invalid user user123 39.36.58.160 port 53162 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=39.36.58.160 |
2020-03-17 01:42:57 |