City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.253.192.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.253.192.107. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 21:26:26 CST 2025
;; MSG SIZE rcvd: 108
Host 107.192.253.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 107.192.253.149.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.236.31.227 | attackbots | Dec 3 10:00:59 MK-Soft-Root2 sshd[31537]: Failed password for www-data from 104.236.31.227 port 49751 ssh2 ... |
2019-12-03 17:25:39 |
| 104.131.58.179 | attackbotsspam | 104.131.58.179 - - \[03/Dec/2019:06:27:25 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.131.58.179 - - \[03/Dec/2019:06:27:25 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-12-03 17:20:12 |
| 138.94.76.13 | attackspambots | Honeypot attack, port: 23, PTR: 76.94.138.13-customer-fttx.brphonia.com.br. |
2019-12-03 17:25:15 |
| 37.98.224.105 | attackbotsspam | Dec 3 10:12:58 legacy sshd[10849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105 Dec 3 10:12:59 legacy sshd[10849]: Failed password for invalid user dajiangda from 37.98.224.105 port 59062 ssh2 Dec 3 10:20:07 legacy sshd[11154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105 ... |
2019-12-03 17:35:38 |
| 182.61.149.96 | attackbotsspam | Dec 3 03:29:29 Tower sshd[26045]: Connection from 182.61.149.96 port 58938 on 192.168.10.220 port 22 Dec 3 03:29:31 Tower sshd[26045]: Invalid user slut from 182.61.149.96 port 58938 Dec 3 03:29:31 Tower sshd[26045]: error: Could not get shadow information for NOUSER Dec 3 03:29:31 Tower sshd[26045]: Failed password for invalid user slut from 182.61.149.96 port 58938 ssh2 Dec 3 03:29:31 Tower sshd[26045]: Received disconnect from 182.61.149.96 port 58938:11: Bye Bye [preauth] Dec 3 03:29:31 Tower sshd[26045]: Disconnected from invalid user slut 182.61.149.96 port 58938 [preauth] |
2019-12-03 17:18:00 |
| 46.101.26.63 | attack | $f2bV_matches |
2019-12-03 17:26:00 |
| 111.93.242.226 | attack | Port 22 Scan, PTR: None |
2019-12-03 17:03:46 |
| 43.254.45.10 | attackbots | 2019-12-03T10:21:46.303838scmdmz1 sshd\[5056\]: Invalid user nicolais from 43.254.45.10 port 59960 2019-12-03T10:21:46.306662scmdmz1 sshd\[5056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.254.45.10 2019-12-03T10:21:48.286798scmdmz1 sshd\[5056\]: Failed password for invalid user nicolais from 43.254.45.10 port 59960 ssh2 ... |
2019-12-03 17:28:57 |
| 78.218.80.88 | attackbotsspam | Port 22 Scan, PTR: None |
2019-12-03 17:21:47 |
| 51.75.153.255 | attack | Dec 3 09:37:11 lnxweb62 sshd[32090]: Failed password for root from 51.75.153.255 port 44916 ssh2 Dec 3 09:37:11 lnxweb62 sshd[32090]: Failed password for root from 51.75.153.255 port 44916 ssh2 Dec 3 09:44:54 lnxweb62 sshd[4758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.153.255 |
2019-12-03 17:05:02 |
| 201.139.88.22 | attackbots | Port 22 Scan, PTR: None |
2019-12-03 17:18:47 |
| 124.106.217.62 | attackspambots | Unauthorised access (Dec 3) SRC=124.106.217.62 LEN=52 TTL=116 ID=31386 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-03 17:19:34 |
| 140.143.236.227 | attackbots | Dec 3 08:40:41 localhost sshd\[80262\]: Invalid user brigitte from 140.143.236.227 port 48924 Dec 3 08:40:41 localhost sshd\[80262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.236.227 Dec 3 08:40:43 localhost sshd\[80262\]: Failed password for invalid user brigitte from 140.143.236.227 port 48924 ssh2 Dec 3 08:48:11 localhost sshd\[80536\]: Invalid user www from 140.143.236.227 port 50638 Dec 3 08:48:11 localhost sshd\[80536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.236.227 ... |
2019-12-03 17:06:18 |
| 129.204.147.84 | attackbots | Dec 3 09:35:51 ArkNodeAT sshd\[27845\]: Invalid user vijayaraj from 129.204.147.84 Dec 3 09:35:51 ArkNodeAT sshd\[27845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.147.84 Dec 3 09:35:53 ArkNodeAT sshd\[27845\]: Failed password for invalid user vijayaraj from 129.204.147.84 port 33420 ssh2 |
2019-12-03 17:11:05 |
| 118.114.244.27 | attackspam | Dec 2 01:59:19 reporting2 sshd[12145]: User r.r from 118.114.244.27 not allowed because not listed in AllowUsers Dec 2 01:59:19 reporting2 sshd[12145]: Failed password for invalid user r.r from 118.114.244.27 port 29726 ssh2 Dec 2 02:07:56 reporting2 sshd[17421]: Invalid user apache from 118.114.244.27 Dec 2 02:07:56 reporting2 sshd[17421]: Failed password for invalid user apache from 118.114.244.27 port 15241 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=118.114.244.27 |
2019-12-03 17:11:30 |