City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.82.189.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.82.189.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 10:23:15 CST 2025
;; MSG SIZE rcvd: 106
Host 68.189.82.148.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 68.189.82.148.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
36.81.174.183 | attack | 20/7/14@14:26:32: FAIL: Alarm-Network address from=36.81.174.183 20/7/14@14:26:33: FAIL: Alarm-Network address from=36.81.174.183 ... |
2020-07-15 05:53:59 |
106.51.80.198 | attack | frenzy |
2020-07-15 05:25:32 |
218.92.0.215 | attackspam | Jul 14 14:48:31 dignus sshd[9813]: Failed password for root from 218.92.0.215 port 34564 ssh2 Jul 14 14:48:33 dignus sshd[9833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215 user=root Jul 14 14:48:34 dignus sshd[9833]: Failed password for root from 218.92.0.215 port 12156 ssh2 Jul 14 14:48:41 dignus sshd[9854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215 user=root Jul 14 14:48:43 dignus sshd[9854]: Failed password for root from 218.92.0.215 port 49885 ssh2 ... |
2020-07-15 05:50:56 |
114.109.18.100 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-15 05:45:18 |
194.170.189.226 | attackbots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-07-15 05:33:33 |
51.159.70.70 | attack | $f2bV_matches |
2020-07-15 05:44:14 |
123.5.49.132 | attackbots | Lines containing failures of 123.5.49.132 Jul 12 22:37:26 neweola sshd[29054]: Invalid user dcm from 123.5.49.132 port 31932 Jul 12 22:37:26 neweola sshd[29054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.5.49.132 Jul 12 22:37:28 neweola sshd[29054]: Failed password for invalid user dcm from 123.5.49.132 port 31932 ssh2 Jul 12 22:37:29 neweola sshd[29054]: Received disconnect from 123.5.49.132 port 31932:11: Bye Bye [preauth] Jul 12 22:37:29 neweola sshd[29054]: Disconnected from invalid user dcm 123.5.49.132 port 31932 [preauth] Jul 12 22:50:04 neweola sshd[29564]: Invalid user user from 123.5.49.132 port 39744 Jul 12 22:50:04 neweola sshd[29564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.5.49.132 Jul 12 22:50:05 neweola sshd[29564]: Failed password for invalid user user from 123.5.49.132 port 39744 ssh2 Jul 12 22:50:06 neweola sshd[29564]: Received disconnect from 123.5........ ------------------------------ |
2020-07-15 05:31:38 |
195.136.206.230 | attackspam | Automatic report - Banned IP Access |
2020-07-15 05:57:47 |
222.186.169.192 | attackbotsspam | Jul 14 21:45:25 localhost sshd[6272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Jul 14 21:45:27 localhost sshd[6272]: Failed password for root from 222.186.169.192 port 35948 ssh2 Jul 14 21:45:30 localhost sshd[6272]: Failed password for root from 222.186.169.192 port 35948 ssh2 Jul 14 21:45:25 localhost sshd[6272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Jul 14 21:45:27 localhost sshd[6272]: Failed password for root from 222.186.169.192 port 35948 ssh2 Jul 14 21:45:30 localhost sshd[6272]: Failed password for root from 222.186.169.192 port 35948 ssh2 Jul 14 21:45:25 localhost sshd[6272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Jul 14 21:45:27 localhost sshd[6272]: Failed password for root from 222.186.169.192 port 35948 ssh2 Jul 14 21:45:30 localhost sshd[6272]: Fai ... |
2020-07-15 05:46:33 |
192.160.102.165 | attackbotsspam | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (=" |
2020-07-15 05:46:18 |
167.71.224.129 | attack | Jul 14 12:50:17 dignus sshd[20916]: Failed password for invalid user fu from 167.71.224.129 port 48344 ssh2 Jul 14 12:52:13 dignus sshd[21216]: Invalid user rd from 167.71.224.129 port 51264 Jul 14 12:52:13 dignus sshd[21216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.224.129 Jul 14 12:52:16 dignus sshd[21216]: Failed password for invalid user rd from 167.71.224.129 port 51264 ssh2 Jul 14 12:54:13 dignus sshd[21540]: Invalid user lsr from 167.71.224.129 port 54194 ... |
2020-07-15 05:36:57 |
181.49.214.43 | attack | SSH brute force attempt |
2020-07-15 05:55:01 |
122.152.217.9 | attackbotsspam | prod8 ... |
2020-07-15 05:56:30 |
92.222.75.80 | attack | Jul 14 21:40:13 localhost sshd[5683]: Invalid user jv from 92.222.75.80 port 55471 Jul 14 21:40:13 localhost sshd[5683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.ip-92-222-75.eu Jul 14 21:40:13 localhost sshd[5683]: Invalid user jv from 92.222.75.80 port 55471 Jul 14 21:40:15 localhost sshd[5683]: Failed password for invalid user jv from 92.222.75.80 port 55471 ssh2 Jul 14 21:45:51 localhost sshd[6345]: Invalid user james from 92.222.75.80 port 53929 ... |
2020-07-15 05:58:33 |
190.164.14.149 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-15 05:30:30 |