City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.68.30.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.68.30.5. IN A
;; AUTHORITY SECTION:
. 215 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:42:34 CST 2022
;; MSG SIZE rcvd: 104
5.30.68.148.in-addr.arpa domain name pointer mo148-68-30-5.air.mopera.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.30.68.148.in-addr.arpa name = mo148-68-30-5.air.mopera.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.154.255.70 | attackbots | 45.154.255.70 - - \[11/Sep/2020:03:12:37 +0200\] "GET /index.php\?id=ausland%27%29%29%2F%2A\&id=%2A%2FAS%2F%2A\&id=%2A%2FZQMg%2F%2A\&id=%2A%2FWHERE%2F%2A\&id=%2A%2F9857%3D9857%2F%2A\&id=%2A%2FOR%2F%2A\&id=%2A%2F4629%3DRAISE_ERROR%28CHR%2855%29%7C%7CCHR%2848%29%7C%7CCHR%2848%29%7C%7CCHR%2848%29%7C%7CCHR%2849%29\&id=CHR%28113%29%7C%7CCHR%28120%29%7C%7CCHR%28113%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%7C%7C%28SELECT%2F%2A\&id=%2A%2F%28CASE%2F%2A\&id=%2A%2FWHEN%2F%2A\&id=%2A%2F%284629%3D4629%29%2F%2A\&id=%2A%2FTHEN%2F%2A\&id=%2A%2F1%2F%2A\&id=%2A%2FELSE%2F%2A\&id=%2A%2F0%2F%2A\&id=%2A%2FEND%29%2F%2A\&id=%2A%2FFROM%2F%2A\&id=%2A%2FSYSIBM.SYSDUMMY1%29%7C%7CCHR%28113%29%7C%7CCHR%2898%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%29--%2F%2A\&id=%2A%2FfZIf HTTP/1.1" 200 12303 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible Googlebot/2.1 http://www.google.com/bot.html\)" ... |
2020-09-12 03:10:49 |
| 46.17.107.162 | attackbots | Icarus honeypot on github |
2020-09-12 03:18:31 |
| 131.108.60.30 | attack | Sep 11 16:36:04 plg sshd[29852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.108.60.30 user=root Sep 11 16:36:06 plg sshd[29852]: Failed password for invalid user root from 131.108.60.30 port 50718 ssh2 Sep 11 16:38:43 plg sshd[29873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.108.60.30 user=root Sep 11 16:38:45 plg sshd[29873]: Failed password for invalid user root from 131.108.60.30 port 51992 ssh2 Sep 11 16:41:22 plg sshd[29952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.108.60.30 Sep 11 16:41:24 plg sshd[29952]: Failed password for invalid user cesar from 131.108.60.30 port 53266 ssh2 ... |
2020-09-12 02:51:45 |
| 188.162.229.206 | attack | 20/9/10@17:53:40: FAIL: Alarm-Network address from=188.162.229.206 ... |
2020-09-12 03:23:58 |
| 128.199.81.66 | attackspambots | Sep 11 19:39:26 sshgateway sshd\[869\]: Invalid user dim from 128.199.81.66 Sep 11 19:39:26 sshgateway sshd\[869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.81.66 Sep 11 19:39:28 sshgateway sshd\[869\]: Failed password for invalid user dim from 128.199.81.66 port 52504 ssh2 |
2020-09-12 03:14:10 |
| 45.8.124.39 | attackspambots | Sep 11 12:49:19 mail.srvfarm.net postfix/submission/smtpd[3765467]: lost connection after EHLO from unknown[45.8.124.39] Sep 11 12:49:20 mail.srvfarm.net postfix/submission/smtpd[3765467]: lost connection after EHLO from unknown[45.8.124.39] Sep 11 12:49:20 mail.srvfarm.net postfix/submission/smtpd[3765467]: lost connection after EHLO from unknown[45.8.124.39] Sep 11 12:49:20 mail.srvfarm.net postfix/submission/smtpd[3765467]: lost connection after EHLO from unknown[45.8.124.39] Sep 11 12:49:20 mail.srvfarm.net postfix/submission/smtpd[3765467]: lost connection after EHLO from unknown[45.8.124.39] |
2020-09-12 03:00:33 |
| 40.120.36.240 | attack | Port Scan: TCP/443 |
2020-09-12 03:16:19 |
| 78.31.93.49 | attackbots | Sep 9 11:37:21 mail.srvfarm.net postfix/smtpd[2330267]: warning: unknown[78.31.93.49]: SASL PLAIN authentication failed: Sep 9 11:37:21 mail.srvfarm.net postfix/smtpd[2330267]: lost connection after AUTH from unknown[78.31.93.49] Sep 9 11:40:09 mail.srvfarm.net postfix/smtps/smtpd[2334662]: warning: unknown[78.31.93.49]: SASL PLAIN authentication failed: Sep 9 11:40:09 mail.srvfarm.net postfix/smtps/smtpd[2334662]: lost connection after AUTH from unknown[78.31.93.49] Sep 9 11:43:26 mail.srvfarm.net postfix/smtps/smtpd[2330448]: warning: unknown[78.31.93.49]: SASL PLAIN authentication failed: |
2020-09-12 03:03:58 |
| 39.45.10.54 | attackbots | 2020/09/07 11:36:48 [error] 8296#8296: *637583 open() "/usr/share/nginx/html/phpMyAdmin/index.php" failed (2: No such file or directory), client: 39.45.10.54, server: _, request: "GET /phpMyAdmin/index.php HTTP/1.1", host: "hausverwaltung-wermelskirchen.de" 2020/09/07 11:36:50 [error] 8296#8296: *637585 open() "/usr/share/nginx/html/pma/index.php" failed (2: No such file or directory), client: 39.45.10.54, server: _, request: "GET /pma/index.php HTTP/1.1", host: "hausverwaltung-wermelskirchen.de" |
2020-09-12 03:04:54 |
| 122.51.67.249 | attack | Sep 11 20:25:11 sshgateway sshd\[6794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.67.249 user=root Sep 11 20:25:13 sshgateway sshd\[6794\]: Failed password for root from 122.51.67.249 port 34314 ssh2 Sep 11 20:34:05 sshgateway sshd\[7995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.67.249 user=root |
2020-09-12 02:56:42 |
| 186.216.64.153 | attack | Sep 8 06:09:56 mail.srvfarm.net postfix/smtpd[1606227]: warning: unknown[186.216.64.153]: SASL PLAIN authentication failed: Sep 8 06:09:56 mail.srvfarm.net postfix/smtpd[1606227]: lost connection after AUTH from unknown[186.216.64.153] Sep 8 06:16:22 mail.srvfarm.net postfix/smtps/smtpd[1607449]: warning: unknown[186.216.64.153]: SASL PLAIN authentication failed: Sep 8 06:16:22 mail.srvfarm.net postfix/smtps/smtpd[1607449]: lost connection after AUTH from unknown[186.216.64.153] Sep 8 06:16:41 mail.srvfarm.net postfix/smtpd[1606227]: warning: unknown[186.216.64.153]: SASL PLAIN authentication failed: |
2020-09-12 02:57:32 |
| 138.36.201.76 | attackbotsspam | Sep 7 11:17:45 mail.srvfarm.net postfix/smtpd[1028351]: warning: unknown[138.36.201.76]: SASL PLAIN authentication failed: Sep 7 11:17:46 mail.srvfarm.net postfix/smtpd[1028351]: lost connection after AUTH from unknown[138.36.201.76] Sep 7 11:19:32 mail.srvfarm.net postfix/smtpd[1014319]: warning: unknown[138.36.201.76]: SASL PLAIN authentication failed: Sep 7 11:19:33 mail.srvfarm.net postfix/smtpd[1014319]: lost connection after AUTH from unknown[138.36.201.76] Sep 7 11:27:41 mail.srvfarm.net postfix/smtps/smtpd[1030527]: warning: unknown[138.36.201.76]: SASL PLAIN authentication failed: |
2020-09-12 03:02:27 |
| 142.4.16.20 | attack | 2020-09-11T13:00:10.091291mail.thespaminator.com sshd[15466]: Invalid user test1 from 142.4.16.20 port 49469 2020-09-11T13:00:11.848874mail.thespaminator.com sshd[15466]: Failed password for invalid user test1 from 142.4.16.20 port 49469 ssh2 ... |
2020-09-12 02:53:21 |
| 77.88.5.16 | attackbotsspam | port scan and connect, tcp 80 (http) |
2020-09-12 03:11:55 |
| 165.227.201.226 | attackbots | Sep 11 17:04:08 sshgateway sshd\[12972\]: Invalid user mysqler from 165.227.201.226 Sep 11 17:04:08 sshgateway sshd\[12972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.201.226 Sep 11 17:04:11 sshgateway sshd\[12972\]: Failed password for invalid user mysqler from 165.227.201.226 port 53152 ssh2 |
2020-09-12 03:17:07 |