City: unknown
Region: unknown
Country: Türkiye
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.140.71.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.140.71.66. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:45:20 CST 2025
;; MSG SIZE rcvd: 106
Host 66.71.140.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.71.140.149.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.74.25.246 | attackspambots | 2020-04-26T21:20:39.472227vps751288.ovh.net sshd\[584\]: Invalid user openlava from 182.74.25.246 port 37879 2020-04-26T21:20:39.480792vps751288.ovh.net sshd\[584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 2020-04-26T21:20:41.306424vps751288.ovh.net sshd\[584\]: Failed password for invalid user openlava from 182.74.25.246 port 37879 ssh2 2020-04-26T21:27:20.264448vps751288.ovh.net sshd\[630\]: Invalid user testuser from 182.74.25.246 port 63196 2020-04-26T21:27:20.272397vps751288.ovh.net sshd\[630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 |
2020-04-27 03:32:13 |
| 138.197.89.212 | attackspambots | Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-04-27 03:08:39 |
| 185.202.1.240 | attack | 2020-04-26T15:10:10.4463891495-001 sshd[3561]: Failed password for invalid user admin from 185.202.1.240 port 58288 ssh2 2020-04-26T15:10:11.4441991495-001 sshd[3563]: Invalid user system from 185.202.1.240 port 8967 2020-04-26T15:10:11.5586631495-001 sshd[3563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.1.240 2020-04-26T15:10:11.4441991495-001 sshd[3563]: Invalid user system from 185.202.1.240 port 8967 2020-04-26T15:10:13.5048431495-001 sshd[3563]: Failed password for invalid user system from 185.202.1.240 port 8967 ssh2 2020-04-26T15:10:14.4962611495-001 sshd[3565]: Invalid user test from 185.202.1.240 port 16862 ... |
2020-04-27 03:31:49 |
| 212.95.141.86 | attack | Invalid user olivia from 212.95.141.86 port 36134 |
2020-04-27 03:27:16 |
| 177.67.240.217 | attackspambots | Apr 26 18:50:28 ws25vmsma01 sshd[207210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.67.240.217 Apr 26 18:50:30 ws25vmsma01 sshd[207210]: Failed password for invalid user dls from 177.67.240.217 port 53821 ssh2 ... |
2020-04-27 03:04:39 |
| 188.254.0.182 | attackbots | Apr 26 14:46:58 lock-38 sshd[1566849]: Failed password for invalid user jaguar from 188.254.0.182 port 50122 ssh2 Apr 26 14:46:59 lock-38 sshd[1566849]: Disconnected from invalid user jaguar 188.254.0.182 port 50122 [preauth] Apr 26 14:55:05 lock-38 sshd[1567097]: Invalid user test from 188.254.0.182 port 32864 Apr 26 14:55:05 lock-38 sshd[1567097]: Invalid user test from 188.254.0.182 port 32864 Apr 26 14:55:05 lock-38 sshd[1567097]: Failed password for invalid user test from 188.254.0.182 port 32864 ssh2 ... |
2020-04-27 03:02:58 |
| 106.13.55.178 | attackbotsspam | 5x Failed Password |
2020-04-27 03:16:21 |
| 190.64.141.18 | attackspambots | Apr 26 06:10:08 server1 sshd\[3723\]: Failed password for invalid user vbox from 190.64.141.18 port 36668 ssh2 Apr 26 06:14:19 server1 sshd\[5159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.141.18 user=root Apr 26 06:14:21 server1 sshd\[5159\]: Failed password for root from 190.64.141.18 port 38100 ssh2 Apr 26 06:18:30 server1 sshd\[6442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.141.18 user=root Apr 26 06:18:33 server1 sshd\[6442\]: Failed password for root from 190.64.141.18 port 39500 ssh2 ... |
2020-04-27 03:30:01 |
| 157.230.235.233 | attackspam | (sshd) Failed SSH login from 157.230.235.233 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 26 21:33:35 s1 sshd[32074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233 user=root Apr 26 21:33:37 s1 sshd[32074]: Failed password for root from 157.230.235.233 port 53562 ssh2 Apr 26 21:42:39 s1 sshd[32448]: Invalid user demo from 157.230.235.233 port 56310 Apr 26 21:42:41 s1 sshd[32448]: Failed password for invalid user demo from 157.230.235.233 port 56310 ssh2 Apr 26 21:46:11 s1 sshd[32561]: Invalid user cyrus from 157.230.235.233 port 40332 |
2020-04-27 03:06:52 |
| 106.12.59.49 | attackbotsspam | Invalid user kobe from 106.12.59.49 port 54774 |
2020-04-27 03:16:51 |
| 103.38.215.237 | attack | 2020-04-26T13:23:06.139037mail.thespaminator.com sshd[29402]: Invalid user deska from 103.38.215.237 port 47390 2020-04-26T13:23:08.398592mail.thespaminator.com sshd[29402]: Failed password for invalid user deska from 103.38.215.237 port 47390 ssh2 ... |
2020-04-27 03:19:43 |
| 181.97.223.175 | attackbots | Invalid user admin from 181.97.223.175 port 46449 |
2020-04-27 03:33:09 |
| 192.210.192.165 | attackbotsspam | *Port Scan* detected from 192.210.192.165 (US/United States/California/Los Angeles (Downtown)/host.colocrossing.com). 4 hits in the last 116 seconds |
2020-04-27 03:29:32 |
| 83.167.87.198 | attack | Apr 26 21:12:40 legacy sshd[7353]: Failed password for root from 83.167.87.198 port 59455 ssh2 Apr 26 21:17:48 legacy sshd[7638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.167.87.198 Apr 26 21:17:50 legacy sshd[7638]: Failed password for invalid user marketing from 83.167.87.198 port 36444 ssh2 ... |
2020-04-27 03:20:50 |
| 64.227.10.241 | attackbots | Apr 26 14:53:40 sso sshd[5592]: Failed password for root from 64.227.10.241 port 55340 ssh2 ... |
2020-04-27 02:56:43 |