City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.68.92.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.68.92.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:00:25 CST 2025
;; MSG SIZE rcvd: 104
Host 1.92.68.149.in-addr.arpa not found: 2(SERVFAIL)
server can't find 149.68.92.1.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.35.248.159 | attackspam | Autoban 111.35.248.159 AUTH/CONNECT |
2019-09-02 01:42:06 |
| 106.13.38.227 | attack | Sep 1 12:24:10 ncomp sshd[25458]: Invalid user steph from 106.13.38.227 Sep 1 12:24:10 ncomp sshd[25458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.38.227 Sep 1 12:24:10 ncomp sshd[25458]: Invalid user steph from 106.13.38.227 Sep 1 12:24:12 ncomp sshd[25458]: Failed password for invalid user steph from 106.13.38.227 port 53592 ssh2 |
2019-09-02 00:55:33 |
| 180.64.71.114 | attackbots | Sep 1 17:23:04 [HOSTNAME] sshd[5873]: Invalid user admin from 180.64.71.114 port 44526 Sep 1 17:28:59 [HOSTNAME] sshd[6542]: User **removed** from 180.64.71.114 not allowed because not listed in AllowUsers Sep 1 17:35:53 [HOSTNAME] sshd[7311]: Invalid user student from 180.64.71.114 port 59870 ... |
2019-09-02 01:03:04 |
| 194.88.204.163 | attackspam | Sep 1 19:05:40 legacy sshd[17469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.88.204.163 Sep 1 19:05:42 legacy sshd[17469]: Failed password for invalid user pan from 194.88.204.163 port 56870 ssh2 Sep 1 19:11:11 legacy sshd[17622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.88.204.163 ... |
2019-09-02 01:23:20 |
| 129.204.40.157 | attack | 2019-09-01T22:54:16.700834enmeeting.mahidol.ac.th sshd\[18797\]: User root from 129.204.40.157 not allowed because not listed in AllowUsers 2019-09-01T22:54:16.822363enmeeting.mahidol.ac.th sshd\[18797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.157 user=root 2019-09-01T22:54:18.460393enmeeting.mahidol.ac.th sshd\[18797\]: Failed password for invalid user root from 129.204.40.157 port 42776 ssh2 ... |
2019-09-02 00:41:04 |
| 193.223.104.128 | attackspambots | Fail2Ban Ban Triggered SMTP Abuse Attempt |
2019-09-02 00:35:08 |
| 93.156.90.85 | attackbots | Sep 1 14:16:11 v22019058497090703 sshd[657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.156.90.85 Sep 1 14:16:13 v22019058497090703 sshd[657]: Failed password for invalid user admin from 93.156.90.85 port 37160 ssh2 Sep 1 14:16:14 v22019058497090703 sshd[657]: Failed password for invalid user admin from 93.156.90.85 port 37160 ssh2 Sep 1 14:16:16 v22019058497090703 sshd[657]: Failed password for invalid user admin from 93.156.90.85 port 37160 ssh2 ... |
2019-09-02 01:28:47 |
| 36.79.171.173 | attackspambots | Sep 1 12:35:27 OPSO sshd\[23767\]: Invalid user zephyr from 36.79.171.173 port 38686 Sep 1 12:35:27 OPSO sshd\[23767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.79.171.173 Sep 1 12:35:29 OPSO sshd\[23767\]: Failed password for invalid user zephyr from 36.79.171.173 port 38686 ssh2 Sep 1 12:41:37 OPSO sshd\[24236\]: Invalid user lucike from 36.79.171.173 port 52712 Sep 1 12:41:37 OPSO sshd\[24236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.79.171.173 |
2019-09-02 01:12:41 |
| 186.206.136.203 | attackbotsspam | Sep 1 07:32:18 php2 sshd\[11012\]: Invalid user timothy from 186.206.136.203 Sep 1 07:32:18 php2 sshd\[11012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.136.203 Sep 1 07:32:20 php2 sshd\[11012\]: Failed password for invalid user timothy from 186.206.136.203 port 44026 ssh2 Sep 1 07:37:49 php2 sshd\[11559\]: Invalid user gigi from 186.206.136.203 Sep 1 07:37:49 php2 sshd\[11559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.136.203 |
2019-09-02 01:45:52 |
| 68.183.85.75 | attackspambots | Sep 1 19:33:23 vps691689 sshd[22303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.85.75 Sep 1 19:33:25 vps691689 sshd[22303]: Failed password for invalid user david from 68.183.85.75 port 38278 ssh2 ... |
2019-09-02 01:39:41 |
| 142.93.81.77 | attackbotsspam | Aug 31 10:01:13 itv-usvr-01 sshd[26849]: Invalid user admin from 142.93.81.77 Aug 31 10:01:13 itv-usvr-01 sshd[26849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.81.77 Aug 31 10:01:13 itv-usvr-01 sshd[26849]: Invalid user admin from 142.93.81.77 Aug 31 10:01:15 itv-usvr-01 sshd[26849]: Failed password for invalid user admin from 142.93.81.77 port 58580 ssh2 |
2019-09-02 01:00:21 |
| 167.71.6.221 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2019-09-02 01:37:21 |
| 178.62.47.177 | attackbotsspam | Aug 28 01:04:29 itv-usvr-01 sshd[17496]: Invalid user tester from 178.62.47.177 Aug 28 01:04:29 itv-usvr-01 sshd[17496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.47.177 Aug 28 01:04:29 itv-usvr-01 sshd[17496]: Invalid user tester from 178.62.47.177 Aug 28 01:04:30 itv-usvr-01 sshd[17496]: Failed password for invalid user tester from 178.62.47.177 port 52392 ssh2 Aug 28 01:08:26 itv-usvr-01 sshd[17652]: Invalid user chuan from 178.62.47.177 |
2019-09-02 01:35:54 |
| 35.202.27.205 | attackspam | Sep 1 07:31:26 sachi sshd\[10763\]: Invalid user musique from 35.202.27.205 Sep 1 07:31:26 sachi sshd\[10763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.27.202.35.bc.googleusercontent.com Sep 1 07:31:28 sachi sshd\[10763\]: Failed password for invalid user musique from 35.202.27.205 port 45938 ssh2 Sep 1 07:37:50 sachi sshd\[11352\]: Invalid user test from 35.202.27.205 Sep 1 07:37:50 sachi sshd\[11352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.27.202.35.bc.googleusercontent.com |
2019-09-02 01:47:00 |
| 185.128.143.162 | attackspambots | router hack attempt |
2019-09-02 01:33:59 |