City: Stavanger
Region: Rogaland
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.94.54.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;152.94.54.75. IN A
;; AUTHORITY SECTION:
. 165 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020031202 1800 900 604800 86400
;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 04:49:46 CST 2020
;; MSG SIZE rcvd: 116
Host 75.54.94.152.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 75.54.94.152.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
34.101.251.82 | attackspam | SSH login attempts. |
2020-10-11 21:57:40 |
112.238.78.55 | attackbots | SSH login attempts. |
2020-10-11 21:54:39 |
93.64.5.34 | attackspambots | Oct 11 11:16:25 l03 sshd[26967]: Invalid user system from 93.64.5.34 port 1499 ... |
2020-10-11 21:56:09 |
62.234.121.61 | attack | Oct 11 02:09:17 vm1 sshd[13943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.121.61 Oct 11 02:09:19 vm1 sshd[13943]: Failed password for invalid user francis from 62.234.121.61 port 51734 ssh2 ... |
2020-10-11 21:30:10 |
141.98.9.166 | attackbotsspam | $f2bV_matches |
2020-10-11 22:03:17 |
172.172.30.158 | attackbots | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-11 21:32:06 |
220.128.104.169 | attackbots | 1602362932 - 10/10/2020 22:48:52 Host: 220.128.104.169/220.128.104.169 Port: 445 TCP Blocked ... |
2020-10-11 21:32:58 |
111.229.43.185 | attackspambots | Oct 11 11:57:56 gospond sshd[20592]: Failed password for root from 111.229.43.185 port 54388 ssh2 Oct 11 11:57:54 gospond sshd[20592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.43.185 user=root Oct 11 11:57:56 gospond sshd[20592]: Failed password for root from 111.229.43.185 port 54388 ssh2 ... |
2020-10-11 22:05:02 |
218.92.0.133 | attackbotsspam | Oct 11 13:49:50 scw-6657dc sshd[518]: Failed password for root from 218.92.0.133 port 11908 ssh2 Oct 11 13:49:50 scw-6657dc sshd[518]: Failed password for root from 218.92.0.133 port 11908 ssh2 Oct 11 13:49:53 scw-6657dc sshd[518]: Failed password for root from 218.92.0.133 port 11908 ssh2 ... |
2020-10-11 21:55:52 |
112.164.242.29 | attack | Automated report - ssh fail2ban: Oct 11 15:51:32 Invalid user pi, port=39216 Oct 11 15:51:32 Invalid user pi, port=39226 Oct 11 15:51:32 Invalid user pi, port=39216 Oct 11 15:51:32 Connection closed by invalid user pi 112.164.242.29 port=39216 [preauth] Oct 11 15:51:32 Invalid user pi, port=39226 Oct 11 15:51:32 Connection closed by invalid user pi 112.164.242.29 port=39226 [preauth] |
2020-10-11 21:52:05 |
205.144.171.147 | attack | (mod_security) mod_security (id:949110) triggered by 205.144.171.147 (US/United States/205-144-171-147.alchemy.net): 5 in the last 14400 secs; ID: rub |
2020-10-11 21:35:47 |
192.173.14.138 | attackspam | Brute forcing email accounts |
2020-10-11 21:33:22 |
182.61.14.93 | attackbots | Lines containing failures of 182.61.14.93 Oct 7 03:20:36 dns01 sshd[2527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.93 user=r.r Oct 7 03:20:38 dns01 sshd[2527]: Failed password for r.r from 182.61.14.93 port 47696 ssh2 Oct 7 03:20:38 dns01 sshd[2527]: Received disconnect from 182.61.14.93 port 47696:11: Bye Bye [preauth] Oct 7 03:20:38 dns01 sshd[2527]: Disconnected from authenticating user r.r 182.61.14.93 port 47696 [preauth] Oct 7 03:30:44 dns01 sshd[5668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.93 user=r.r Oct 7 03:30:47 dns01 sshd[5668]: Failed password for r.r from 182.61.14.93 port 34506 ssh2 Oct 7 03:30:48 dns01 sshd[5668]: Received disconnect from 182.61.14.93 port 34506:11: Bye Bye [preauth] Oct 7 03:30:48 dns01 sshd[5668]: Disconnected from authenticating user r.r 182.61.14.93 port 34506 [preauth] Oct 7 03:35:07 dns01 sshd[6692]: pam_u........ ------------------------------ |
2020-10-11 21:36:02 |
87.251.77.206 | attackbots | port scan and connect, tcp 22 (ssh) |
2020-10-11 22:01:27 |
51.81.83.128 | attackbots | 20 attempts against mh-misbehave-ban on sonic |
2020-10-11 22:02:17 |