City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.70.72.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;157.70.72.3. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:24:06 CST 2025
;; MSG SIZE rcvd: 104
Host 3.72.70.157.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 3.72.70.157.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.211.20.244 | attackbotsspam | 1596721181 - 08/06/2020 15:39:41 Host: 103.211.20.244/103.211.20.244 Port: 445 TCP Blocked |
2020-08-06 22:26:09 |
| 86.34.240.35 | attackbots | Unauthorised access (Aug 6) SRC=86.34.240.35 LEN=44 TTL=53 ID=7430 TCP DPT=23 WINDOW=2034 SYN |
2020-08-06 22:04:44 |
| 167.172.36.137 | attack | 25461/tcp [2020-08-06]1pkt |
2020-08-06 22:02:07 |
| 142.4.213.28 | attackspambots | 142.4.213.28 - - [06/Aug/2020:16:11:16 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.4.213.28 - - [06/Aug/2020:16:11:18 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.4.213.28 - - [06/Aug/2020:16:11:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-06 22:24:54 |
| 193.27.228.215 | attackbotsspam | Attempted to establish connection to non opened port 6043 |
2020-08-06 22:01:12 |
| 142.93.101.148 | attackspam | Aug 6 13:57:48 localhost sshd[113102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 user=root Aug 6 13:57:50 localhost sshd[113102]: Failed password for root from 142.93.101.148 port 37258 ssh2 Aug 6 14:01:54 localhost sshd[113652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 user=root Aug 6 14:01:56 localhost sshd[113652]: Failed password for root from 142.93.101.148 port 48292 ssh2 Aug 6 14:05:56 localhost sshd[114118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 user=root Aug 6 14:05:58 localhost sshd[114118]: Failed password for root from 142.93.101.148 port 59322 ssh2 ... |
2020-08-06 22:10:35 |
| 134.122.131.164 | attack | 1433/tcp [2020-08-06]1pkt |
2020-08-06 22:03:16 |
| 80.82.65.105 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 23 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-06 22:00:41 |
| 59.9.199.98 | attackspam | Lines containing failures of 59.9.199.98 (max 1000) Aug 3 16:21:54 localhost sshd[4929]: User r.r from 59.9.199.98 not allowed because listed in DenyUsers Aug 3 16:21:54 localhost sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.9.199.98 user=r.r Aug 3 16:21:56 localhost sshd[4929]: Failed password for invalid user r.r from 59.9.199.98 port 52349 ssh2 Aug 3 16:21:58 localhost sshd[4929]: Received disconnect from 59.9.199.98 port 52349:11: Bye Bye [preauth] Aug 3 16:21:58 localhost sshd[4929]: Disconnected from invalid user r.r 59.9.199.98 port 52349 [preauth] Aug 3 16:36:16 localhost sshd[7463]: User r.r from 59.9.199.98 not allowed because listed in DenyUsers Aug 3 16:36:16 localhost sshd[7463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.9.199.98 user=r.r Aug 3 16:36:18 localhost sshd[7463]: Failed password for invalid user r.r from 59.9.199.98 port 27463 ssh2........ ------------------------------ |
2020-08-06 22:37:30 |
| 200.119.112.204 | attackspam | Aug 6 15:26:40 xeon sshd[61598]: Failed password for root from 200.119.112.204 port 51610 ssh2 |
2020-08-06 22:40:41 |
| 181.49.176.36 | attackbotsspam | Unauthorised access (Aug 6) SRC=181.49.176.36 LEN=52 TTL=106 ID=4228 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-06 22:10:20 |
| 106.51.85.16 | attack | " " |
2020-08-06 22:04:29 |
| 114.7.164.170 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-08-06 22:29:00 |
| 45.55.57.6 | attackbots | Aug 6 10:10:13 NPSTNNYC01T sshd[5212]: Failed password for root from 45.55.57.6 port 34290 ssh2 Aug 6 10:14:37 NPSTNNYC01T sshd[5521]: Failed password for root from 45.55.57.6 port 41182 ssh2 ... |
2020-08-06 22:32:26 |
| 91.205.75.94 | attackspam | Aug 6 03:31:26 php1 sshd\[29922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.75.94 user=root Aug 6 03:31:28 php1 sshd\[29922\]: Failed password for root from 91.205.75.94 port 39662 ssh2 Aug 6 03:36:25 php1 sshd\[30320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.75.94 user=root Aug 6 03:36:27 php1 sshd\[30320\]: Failed password for root from 91.205.75.94 port 50276 ssh2 Aug 6 03:41:17 php1 sshd\[30885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.75.94 user=root |
2020-08-06 22:22:04 |