City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.227.27.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20874
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.227.27.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 16:37:53 CST 2025
;; MSG SIZE rcvd: 106
Host 74.27.227.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.27.227.149.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 138.68.4.198 | attack | Oct 20 20:56:09 hanapaa sshd\[30726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198 user=root Oct 20 20:56:11 hanapaa sshd\[30726\]: Failed password for root from 138.68.4.198 port 43828 ssh2 Oct 20 21:00:02 hanapaa sshd\[31006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198 user=root Oct 20 21:00:04 hanapaa sshd\[31006\]: Failed password for root from 138.68.4.198 port 53226 ssh2 Oct 20 21:04:01 hanapaa sshd\[31336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198 user=root |
2019-10-21 16:20:23 |
| 123.207.149.93 | attackspambots | Oct 21 06:07:06 SilenceServices sshd[32076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93 Oct 21 06:07:08 SilenceServices sshd[32076]: Failed password for invalid user almacen from 123.207.149.93 port 40578 ssh2 Oct 21 06:11:36 SilenceServices sshd[889]: Failed password for root from 123.207.149.93 port 47634 ssh2 |
2019-10-21 16:28:14 |
| 71.6.158.166 | attackspam | [Sun Oct 20 10:11:50 2019] [error] [client 71.6.158.166] File does not exist: /home/gerald/public_html/.well-known |
2019-10-21 16:15:17 |
| 93.95.56.130 | attackbots | Oct 21 10:21:59 meumeu sshd[15699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.95.56.130 Oct 21 10:22:01 meumeu sshd[15699]: Failed password for invalid user hana from 93.95.56.130 port 53014 ssh2 Oct 21 10:22:22 meumeu sshd[15770]: Failed password for root from 93.95.56.130 port 54779 ssh2 ... |
2019-10-21 16:28:33 |
| 59.33.84.235 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/59.33.84.235/ CN - 1H : (407) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 59.33.84.235 CIDR : 59.33.64.0/18 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 ATTACKS DETECTED ASN4134 : 1H - 6 3H - 19 6H - 36 12H - 88 24H - 150 DateTime : 2019-10-21 05:48:52 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-21 16:26:48 |
| 117.89.71.220 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/117.89.71.220/ CN - 1H : (421) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 117.89.71.220 CIDR : 117.88.0.0/15 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 ATTACKS DETECTED ASN4134 : 1H - 11 3H - 27 6H - 45 12H - 87 24H - 161 DateTime : 2019-10-21 08:37:32 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery |
2019-10-21 16:21:19 |
| 106.13.98.148 | attackspambots | Oct 21 09:52:03 vmanager6029 sshd\[14302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.148 user=root Oct 21 09:52:05 vmanager6029 sshd\[14302\]: Failed password for root from 106.13.98.148 port 36822 ssh2 Oct 21 09:57:11 vmanager6029 sshd\[14376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.148 user=root |
2019-10-21 16:43:30 |
| 103.115.104.229 | attack | Oct 21 09:49:51 icinga sshd[14849]: Failed password for root from 103.115.104.229 port 38100 ssh2 Oct 21 09:54:23 icinga sshd[15297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.229 ... |
2019-10-21 16:23:22 |
| 171.25.193.77 | attack | Oct 21 09:15:22 rotator sshd\[12548\]: Failed password for root from 171.25.193.77 port 21588 ssh2Oct 21 09:15:23 rotator sshd\[12548\]: Failed password for root from 171.25.193.77 port 21588 ssh2Oct 21 09:15:25 rotator sshd\[12548\]: Failed password for root from 171.25.193.77 port 21588 ssh2Oct 21 09:15:29 rotator sshd\[12548\]: Failed password for root from 171.25.193.77 port 21588 ssh2Oct 21 09:15:31 rotator sshd\[12548\]: Failed password for root from 171.25.193.77 port 21588 ssh2Oct 21 09:15:34 rotator sshd\[12548\]: Failed password for root from 171.25.193.77 port 21588 ssh2 ... |
2019-10-21 16:12:52 |
| 41.215.10.6 | attack | (From luann.sambell@outlook.com) Get free gas, free groceries, free movie and music downloads, product giveaways and more free offers just for completing small surveys, visit: http://freestuff.giveawaysusa.xyz |
2019-10-21 16:40:45 |
| 111.231.71.157 | attack | 2019-10-21T01:33:19.5390531495-001 sshd\[63004\]: Failed password for invalid user customer from 111.231.71.157 port 55670 ssh2 2019-10-21T02:56:10.0818701495-001 sshd\[1020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root 2019-10-21T02:56:12.1771331495-001 sshd\[1020\]: Failed password for root from 111.231.71.157 port 59742 ssh2 2019-10-21T03:11:44.1709021495-001 sshd\[1972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root 2019-10-21T03:11:46.4868271495-001 sshd\[1972\]: Failed password for root from 111.231.71.157 port 34202 ssh2 2019-10-21T03:22:07.2492481495-001 sshd\[7035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root ... |
2019-10-21 16:49:10 |
| 94.191.39.69 | attackspambots | $f2bV_matches |
2019-10-21 16:42:19 |
| 218.19.138.93 | attack | Too many connections or unauthorized access detected from Arctic banned ip |
2019-10-21 16:27:34 |
| 129.213.63.120 | attack | Invalid user project from 129.213.63.120 port 50062 |
2019-10-21 16:25:02 |
| 58.248.254.124 | attackbotsspam | Oct 20 22:05:59 kapalua sshd\[3127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124 user=root Oct 20 22:06:02 kapalua sshd\[3127\]: Failed password for root from 58.248.254.124 port 39820 ssh2 Oct 20 22:10:36 kapalua sshd\[3636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124 user=root Oct 20 22:10:38 kapalua sshd\[3636\]: Failed password for root from 58.248.254.124 port 57548 ssh2 Oct 20 22:15:13 kapalua sshd\[4035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124 user=root |
2019-10-21 16:21:49 |