City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.16.11.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.16.11.45. IN A
;; AUTHORITY SECTION:
. 528 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021122901 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 03:04:15 CST 2021
;; MSG SIZE rcvd: 105
b'Host 45.11.16.158.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 158.16.11.45.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
196.202.147.50 | attackbots | Unauthorized connection attempt detected from IP address 196.202.147.50 to port 445 |
2020-02-27 08:50:26 |
107.189.11.193 | attackbotsspam | Feb 26 21:20:17 XXX sshd[57662]: Invalid user fake from 107.189.11.193 port 42922 |
2020-02-27 08:22:17 |
173.245.239.10 | attackbots | (imapd) Failed IMAP login from 173.245.239.10 (US/United States/-): 1 in the last 3600 secs |
2020-02-27 08:23:02 |
117.247.86.117 | attackbots | Feb 27 00:59:47 server sshd[2468673]: Failed password for invalid user mega from 117.247.86.117 port 52438 ssh2 Feb 27 01:04:56 server sshd[2473086]: Failed password for root from 117.247.86.117 port 41122 ssh2 Feb 27 01:10:05 server sshd[2481031]: Failed password for sys from 117.247.86.117 port 58036 ssh2 |
2020-02-27 08:51:56 |
112.85.42.172 | attackspam | Feb 27 01:16:43 legacy sshd[29864]: Failed password for root from 112.85.42.172 port 1137 ssh2 Feb 27 01:16:46 legacy sshd[29864]: Failed password for root from 112.85.42.172 port 1137 ssh2 Feb 27 01:16:50 legacy sshd[29864]: Failed password for root from 112.85.42.172 port 1137 ssh2 Feb 27 01:16:54 legacy sshd[29864]: Failed password for root from 112.85.42.172 port 1137 ssh2 ... |
2020-02-27 08:27:01 |
165.227.123.146 | attackbotsspam | Feb 25 05:21:58 w sshd[26098]: Invalid user kristofvps from 165.227.123.146 Feb 25 05:21:58 w sshd[26098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.123.146 Feb 25 05:22:00 w sshd[26098]: Failed password for invalid user kristofvps from 165.227.123.146 port 57330 ssh2 Feb 25 05:22:00 w sshd[26098]: Received disconnect from 165.227.123.146: 11: Bye Bye [preauth] Feb 25 05:55:04 w sshd[26505]: Invalid user sammy from 165.227.123.146 Feb 25 05:55:04 w sshd[26505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.123.146 Feb 25 05:55:06 w sshd[26505]: Failed password for invalid user sammy from 165.227.123.146 port 46698 ssh2 Feb 25 05:55:06 w sshd[26505]: Received disconnect from 165.227.123.146: 11: Bye Bye [preauth] Feb 25 06:07:49 w sshd[26702]: Invalid user adrian from 165.227.123.146 Feb 25 06:07:49 w sshd[26702]: pam_unix(sshd:auth): authentication failure; logname=........ ------------------------------- |
2020-02-27 08:37:20 |
181.40.73.86 | attackspam | Invalid user ubuntu from 181.40.73.86 port 36239 |
2020-02-27 08:15:56 |
185.176.27.250 | attack | Excessive Port-Scanning |
2020-02-27 08:34:28 |
106.12.7.100 | attackspambots | Feb 26 19:23:45 NPSTNNYC01T sshd[13650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.100 Feb 26 19:23:47 NPSTNNYC01T sshd[13650]: Failed password for invalid user timemachine from 106.12.7.100 port 57544 ssh2 Feb 26 19:30:33 NPSTNNYC01T sshd[14038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.100 ... |
2020-02-27 08:53:33 |
104.248.154.239 | attack | Feb 26 20:45:29 server sshd\[19799\]: Failed password for invalid user deployer from 104.248.154.239 port 50070 ssh2 Feb 27 02:56:33 server sshd\[32637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.154.239 user=root Feb 27 02:56:35 server sshd\[32637\]: Failed password for root from 104.248.154.239 port 40304 ssh2 Feb 27 03:08:39 server sshd\[3751\]: Invalid user confluence from 104.248.154.239 Feb 27 03:08:39 server sshd\[3751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.154.239 ... |
2020-02-27 08:38:29 |
119.31.123.143 | attackbotsspam | Feb 27 00:17:06 lnxded63 sshd[13462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.123.143 |
2020-02-27 08:33:07 |
106.15.238.84 | attackspambots | Feb 25 17:55:13 [redacted] sshd[15690]: Unable to negotiate with 106.15.238.84 port 52332: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] |
2020-02-27 08:30:16 |
185.173.35.9 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2020-02-27 08:21:06 |
137.226.113.26 | attackbots | 137.226.113.26 - - [26/Feb/2020:21:47:54 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x (compatible; Researchscan/t12sns; +http://researchscan.comsys.rwth-aachen.de)" |
2020-02-27 08:20:14 |
5.178.151.204 | attack | Automatic report - Port Scan Attack |
2020-02-27 08:56:19 |