City: unknown
Region: unknown
Country: Norway
Internet Service Provider: Telenor
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.106.30.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.106.30.101. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070702 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 08 11:35:55 CST 2025
;; MSG SIZE rcvd: 107
Host 101.30.106.150.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 101.30.106.150.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
87.251.74.170 | attack | May 10 01:56:18 debian-2gb-nbg1-2 kernel: \[11327452.676140\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.170 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=5607 PROTO=TCP SPT=47584 DPT=11885 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-10 08:32:12 |
69.116.62.74 | attackbotsspam | May 10 04:57:22 gw1 sshd[26393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.116.62.74 May 10 04:57:24 gw1 sshd[26393]: Failed password for invalid user arkserver from 69.116.62.74 port 49296 ssh2 ... |
2020-05-10 08:09:15 |
103.1.209.245 | attack | 2020-05-10T00:34:07.997387rocketchat.forhosting.nl sshd[6883]: Invalid user web from 103.1.209.245 port 50218 2020-05-10T00:34:10.205069rocketchat.forhosting.nl sshd[6883]: Failed password for invalid user web from 103.1.209.245 port 50218 ssh2 2020-05-10T00:38:21.855174rocketchat.forhosting.nl sshd[6953]: Invalid user track from 103.1.209.245 port 51376 ... |
2020-05-10 08:03:40 |
124.235.171.114 | attackspam | SSH bruteforce |
2020-05-10 08:24:22 |
112.85.42.232 | attackspambots | May 10 02:32:58 home sshd[23082]: Failed password for root from 112.85.42.232 port 50451 ssh2 May 10 02:33:00 home sshd[23082]: Failed password for root from 112.85.42.232 port 50451 ssh2 May 10 02:33:02 home sshd[23082]: Failed password for root from 112.85.42.232 port 50451 ssh2 ... |
2020-05-10 08:37:12 |
218.240.137.68 | attackbots | May 9 17:26:48 ws22vmsma01 sshd[54201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68 May 9 17:26:50 ws22vmsma01 sshd[54201]: Failed password for invalid user postgres from 218.240.137.68 port 59490 ssh2 ... |
2020-05-10 08:21:16 |
51.178.50.244 | attackbotsspam | May 10 00:56:59 Ubuntu-1404-trusty-64-minimal sshd\[4942\]: Invalid user deploy from 51.178.50.244 May 10 00:56:59 Ubuntu-1404-trusty-64-minimal sshd\[4942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.50.244 May 10 00:57:01 Ubuntu-1404-trusty-64-minimal sshd\[4942\]: Failed password for invalid user deploy from 51.178.50.244 port 37264 ssh2 May 10 01:09:27 Ubuntu-1404-trusty-64-minimal sshd\[14281\]: Invalid user postgres from 51.178.50.244 May 10 01:09:27 Ubuntu-1404-trusty-64-minimal sshd\[14281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.50.244 |
2020-05-10 08:34:19 |
222.186.173.215 | attackspam | May 10 02:21:26 vserver sshd\[21772\]: Failed password for root from 222.186.173.215 port 61166 ssh2May 10 02:21:29 vserver sshd\[21772\]: Failed password for root from 222.186.173.215 port 61166 ssh2May 10 02:21:32 vserver sshd\[21772\]: Failed password for root from 222.186.173.215 port 61166 ssh2May 10 02:21:36 vserver sshd\[21772\]: Failed password for root from 222.186.173.215 port 61166 ssh2 ... |
2020-05-10 08:34:47 |
45.143.220.133 | attack | Excessive Port-Scanning |
2020-05-10 08:04:11 |
49.88.112.111 | attackspambots | May 9 19:47:21 plusreed sshd[22264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111 user=root May 9 19:47:23 plusreed sshd[22264]: Failed password for root from 49.88.112.111 port 33984 ssh2 ... |
2020-05-10 08:02:32 |
210.87.7.35 | attackspam | May 7 02:59:51 online-web-vs-1 sshd[1696522]: Invalid user ddr from 210.87.7.35 port 41258 May 7 02:59:51 online-web-vs-1 sshd[1696522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.87.7.35 May 7 02:59:53 online-web-vs-1 sshd[1696522]: Failed password for invalid user ddr from 210.87.7.35 port 41258 ssh2 May 7 02:59:53 online-web-vs-1 sshd[1696522]: Received disconnect from 210.87.7.35 port 41258:11: Bye Bye [preauth] May 7 02:59:53 online-web-vs-1 sshd[1696522]: Disconnected from 210.87.7.35 port 41258 [preauth] May 7 03:11:38 online-web-vs-1 sshd[1698552]: Invalid user bcs from 210.87.7.35 port 47384 May 7 03:11:38 online-web-vs-1 sshd[1698552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.87.7.35 May 7 03:11:40 online-web-vs-1 sshd[1698552]: Failed password for invalid user bcs from 210.87.7.35 port 47384 ssh2 May 7 03:11:41 online-web-vs-1 sshd[1698552]: Received d........ ------------------------------- |
2020-05-10 08:32:39 |
218.90.102.184 | attack | 2020-05-10T01:05:36.443792sd-86998 sshd[44000]: Invalid user ubuntu from 218.90.102.184 port 8738 2020-05-10T01:05:36.446265sd-86998 sshd[44000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.90.102.184 2020-05-10T01:05:36.443792sd-86998 sshd[44000]: Invalid user ubuntu from 218.90.102.184 port 8738 2020-05-10T01:05:38.307670sd-86998 sshd[44000]: Failed password for invalid user ubuntu from 218.90.102.184 port 8738 ssh2 2020-05-10T01:09:55.877427sd-86998 sshd[44560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.90.102.184 user=root 2020-05-10T01:09:57.959839sd-86998 sshd[44560]: Failed password for root from 218.90.102.184 port 63233 ssh2 ... |
2020-05-10 08:15:09 |
35.244.25.124 | attack | 2020-05-09T18:40:23.0526561495-001 sshd[60118]: Failed password for invalid user ubuntu from 35.244.25.124 port 34186 ssh2 2020-05-09T18:45:22.1574761495-001 sshd[60339]: Invalid user test from 35.244.25.124 port 60940 2020-05-09T18:45:22.1616891495-001 sshd[60339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.25.244.35.bc.googleusercontent.com 2020-05-09T18:45:22.1574761495-001 sshd[60339]: Invalid user test from 35.244.25.124 port 60940 2020-05-09T18:45:23.3874881495-001 sshd[60339]: Failed password for invalid user test from 35.244.25.124 port 60940 ssh2 2020-05-09T18:50:22.6558291495-001 sshd[60474]: Invalid user user2 from 35.244.25.124 port 59462 ... |
2020-05-10 08:17:08 |
60.229.66.232 | attackbots | May 10 00:07:14 debian-2gb-nbg1-2 kernel: \[11320908.645264\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=60.229.66.232 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x40 TTL=47 ID=65433 PROTO=TCP SPT=7989 DPT=23 WINDOW=1069 RES=0x00 SYN URGP=0 |
2020-05-10 08:20:11 |
156.205.145.202 | attackspam | 2020-05-09T20:26:00.403313upcloud.m0sh1x2.com sshd[711]: Invalid user service from 156.205.145.202 port 61419 |
2020-05-10 08:23:54 |