City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.130.64.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.130.64.159. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:31:16 CST 2025
;; MSG SIZE rcvd: 107
Host 159.64.130.148.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 159.64.130.148.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
171.6.164.24 | attack | Oct 17 05:22:19 django sshd[114186]: reveeclipse mapping checking getaddrinfo for mx-ll-171.6.164-24.dynamic.3bb.in.th [171.6.164.24] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 17 05:22:19 django sshd[114186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.6.164.24 user=r.r Oct 17 05:22:21 django sshd[114186]: Failed password for r.r from 171.6.164.24 port 1812 ssh2 Oct 17 05:22:21 django sshd[114187]: Received disconnect from 171.6.164.24: 11: Bye Bye Oct 17 05:26:38 django sshd[114745]: reveeclipse mapping checking getaddrinfo for mx-ll-171.6.164-24.dynamic.3bb.in.th [171.6.164.24] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 17 05:26:38 django sshd[114745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.6.164.24 user=r.r Oct 17 05:26:39 django sshd[114745]: Failed password for r.r from 171.6.164.24 port 6022 ssh2 Oct 17 05:26:39 django sshd[114746]: Received disconnect from 171.6.164......... ------------------------------- |
2019-10-21 05:26:02 |
193.238.177.91 | attackspam | Honeypot attack, port: 445, PTR: host-193-238-177-91.123online.org. |
2019-10-21 05:29:00 |
113.106.8.55 | attackspam | Oct 20 11:12:17 tdfoods sshd\[26115\]: Invalid user master!@\# from 113.106.8.55 Oct 20 11:12:17 tdfoods sshd\[26115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.106.8.55 Oct 20 11:12:19 tdfoods sshd\[26115\]: Failed password for invalid user master!@\# from 113.106.8.55 port 43834 ssh2 Oct 20 11:16:29 tdfoods sshd\[26434\]: Invalid user 123qweasdzxc from 113.106.8.55 Oct 20 11:16:29 tdfoods sshd\[26434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.106.8.55 |
2019-10-21 05:19:27 |
124.205.114.11 | attack | 2019-10-20T22:44:11.7644701240 sshd\[7894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.114.11 user=root 2019-10-20T22:44:14.3154261240 sshd\[7894\]: Failed password for root from 124.205.114.11 port 58052 ssh2 2019-10-20T22:48:56.9765111240 sshd\[8093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.114.11 user=root ... |
2019-10-21 05:30:37 |
222.186.180.223 | attack | Oct 20 18:33:08 firewall sshd[12113]: Failed password for root from 222.186.180.223 port 50996 ssh2 Oct 20 18:33:08 firewall sshd[12113]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 50996 ssh2 [preauth] Oct 20 18:33:08 firewall sshd[12113]: Disconnecting: Too many authentication failures [preauth] ... |
2019-10-21 05:34:31 |
218.19.145.13 | attackspambots | 2019-10-20T21:30:09.748917abusebot-8.cloudsearch.cf sshd\[14487\]: Invalid user password from 218.19.145.13 port 2168 |
2019-10-21 05:40:12 |
222.186.173.180 | attackspam | Oct 20 17:25:54 TORMINT sshd\[12930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Oct 20 17:25:56 TORMINT sshd\[12930\]: Failed password for root from 222.186.173.180 port 24734 ssh2 Oct 20 17:26:13 TORMINT sshd\[12930\]: Failed password for root from 222.186.173.180 port 24734 ssh2 ... |
2019-10-21 05:28:11 |
51.83.69.78 | attack | Oct 20 22:42:31 xeon sshd[3269]: Failed password for root from 51.83.69.78 port 34940 ssh2 |
2019-10-21 05:12:05 |
139.186.22.61 | attack | 2019-10-16T23:42:35.847104game.arvenenaske.de sshd[38407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.22.61 user=r.r 2019-10-16T23:42:38.239358game.arvenenaske.de sshd[38407]: Failed password for r.r from 139.186.22.61 port 43694 ssh2 2019-10-16T23:47:33.578659game.arvenenaske.de sshd[38415]: Invalid user loser from 139.186.22.61 port 54404 2019-10-16T23:47:33.585683game.arvenenaske.de sshd[38415]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.22.61 user=loser 2019-10-16T23:47:33.586304game.arvenenaske.de sshd[38415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.22.61 2019-10-16T23:47:33.578659game.arvenenaske.de sshd[38415]: Invalid user loser from 139.186.22.61 port 54404 2019-10-16T23:47:35.220928game.arvenenaske.de sshd[38415]: Failed password for invalid user loser from 139.186.22.61 port 54404 ssh2 2019-10-16T23:5........ ------------------------------ |
2019-10-21 05:20:52 |
140.249.192.87 | attackspambots | Oct 20 11:00:41 hanapaa sshd\[12048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.192.87 user=root Oct 20 11:00:43 hanapaa sshd\[12048\]: Failed password for root from 140.249.192.87 port 35072 ssh2 Oct 20 11:04:54 hanapaa sshd\[12401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.192.87 user=root Oct 20 11:04:57 hanapaa sshd\[12401\]: Failed password for root from 140.249.192.87 port 53548 ssh2 Oct 20 11:09:02 hanapaa sshd\[12761\]: Invalid user ram from 140.249.192.87 |
2019-10-21 05:16:43 |
202.83.215.105 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-21 05:15:59 |
138.59.18.110 | attackspam | B: Abusive content scan (301) |
2019-10-21 05:34:44 |
202.164.48.202 | attack | Oct 20 22:06:00 nextcloud sshd\[5579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202 user=root Oct 20 22:06:02 nextcloud sshd\[5579\]: Failed password for root from 202.164.48.202 port 46359 ssh2 Oct 20 22:27:22 nextcloud sshd\[12346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202 user=root ... |
2019-10-21 05:15:39 |
80.103.35.79 | attack | [Aegis] @ 2019-10-20 21:27:19 0100 -> SSH insecure connection attempt (scan). |
2019-10-21 05:13:05 |
120.72.83.204 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-21 05:17:34 |