City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.118.53.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.118.53.194. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:48:28 CST 2025
;; MSG SIZE rcvd: 107
Host 194.53.118.160.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 194.53.118.160.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
194.135.228.30 | attackspam | 1576766195 - 12/19/2019 15:36:35 Host: 194.135.228.30/194.135.228.30 Port: 445 TCP Blocked |
2019-12-20 01:27:47 |
62.215.6.11 | attackbots | Dec 20 00:25:35 webhost01 sshd[19509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.6.11 Dec 20 00:25:36 webhost01 sshd[19509]: Failed password for invalid user Melon2017 from 62.215.6.11 port 42892 ssh2 ... |
2019-12-20 01:41:22 |
212.48.70.22 | attack | Dec 19 18:30:45 microserver sshd[25658]: Invalid user waschhauser from 212.48.70.22 port 38042 Dec 19 18:30:45 microserver sshd[25658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.48.70.22 Dec 19 18:30:47 microserver sshd[25658]: Failed password for invalid user waschhauser from 212.48.70.22 port 38042 ssh2 Dec 19 18:36:10 microserver sshd[26412]: Invalid user denis from 212.48.70.22 port 45476 Dec 19 18:36:10 microserver sshd[26412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.48.70.22 Dec 19 18:46:37 microserver sshd[27918]: Invalid user server from 212.48.70.22 port 60716 Dec 19 18:46:37 microserver sshd[27918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.48.70.22 Dec 19 18:46:39 microserver sshd[27918]: Failed password for invalid user server from 212.48.70.22 port 60716 ssh2 Dec 19 18:52:02 microserver sshd[28659]: pam_unix(sshd:auth): authentication failure; log |
2019-12-20 01:45:56 |
200.105.215.122 | attackbotsspam | Attempt to log in with non-existing username "admin" /wp-login.php |
2019-12-20 01:05:24 |
65.52.169.39 | attackspam | Dec 19 16:38:10 hcbbdb sshd\[23640\]: Invalid user foon from 65.52.169.39 Dec 19 16:38:10 hcbbdb sshd\[23640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.52.169.39 Dec 19 16:38:12 hcbbdb sshd\[23640\]: Failed password for invalid user foon from 65.52.169.39 port 50952 ssh2 Dec 19 16:44:13 hcbbdb sshd\[24242\]: Invalid user bichnga from 65.52.169.39 Dec 19 16:44:13 hcbbdb sshd\[24242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.52.169.39 |
2019-12-20 01:03:49 |
79.7.246.21 | attackspambots | 2019-12-19T16:57:17.802843shield sshd\[17135\]: Invalid user cssserver from 79.7.246.21 port 58371 2019-12-19T16:57:17.807197shield sshd\[17135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host21-246-static.7-79-b.business.telecomitalia.it 2019-12-19T16:57:19.407467shield sshd\[17135\]: Failed password for invalid user cssserver from 79.7.246.21 port 58371 ssh2 2019-12-19T17:02:49.040307shield sshd\[19260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host21-246-static.7-79-b.business.telecomitalia.it user=root 2019-12-19T17:02:51.784322shield sshd\[19260\]: Failed password for root from 79.7.246.21 port 59734 ssh2 |
2019-12-20 01:18:50 |
91.121.136.44 | attackspambots | Dec 19 12:00:15 ny01 sshd[13365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44 Dec 19 12:00:17 ny01 sshd[13365]: Failed password for invalid user cynergy1 from 91.121.136.44 port 55328 ssh2 Dec 19 12:05:27 ny01 sshd[13832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44 |
2019-12-20 01:11:57 |
189.103.85.27 | attackspambots | Dec 19 02:18:56 server sshd\[12269\]: Failed password for root from 189.103.85.27 port 33526 ssh2 Dec 19 16:26:41 server sshd\[16340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.103.85.27 user=root Dec 19 16:26:42 server sshd\[16340\]: Failed password for root from 189.103.85.27 port 55792 ssh2 Dec 19 20:10:26 server sshd\[12609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.103.85.27 user=root Dec 19 20:10:29 server sshd\[12609\]: Failed password for root from 189.103.85.27 port 47592 ssh2 ... |
2019-12-20 01:42:33 |
34.69.138.73 | attackspam | Attempt to log in with non-existing username [login] /wp-login.php |
2019-12-20 01:23:20 |
120.89.64.8 | attackspambots | Invalid user test from 120.89.64.8 port 53152 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.89.64.8 Failed password for invalid user test from 120.89.64.8 port 53152 ssh2 Invalid user ailyn from 120.89.64.8 port 56520 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.89.64.8 |
2019-12-20 01:36:57 |
144.217.170.235 | attackspam | Dec 19 23:34:40 webhost01 sshd[18597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.170.235 Dec 19 23:34:41 webhost01 sshd[18597]: Failed password for invalid user user6 from 144.217.170.235 port 55404 ssh2 ... |
2019-12-20 01:07:53 |
51.159.35.94 | attackbots | Dec 19 18:12:56 OPSO sshd\[23861\]: Invalid user web from 51.159.35.94 port 56912 Dec 19 18:12:56 OPSO sshd\[23861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.35.94 Dec 19 18:12:59 OPSO sshd\[23861\]: Failed password for invalid user web from 51.159.35.94 port 56912 ssh2 Dec 19 18:18:25 OPSO sshd\[24782\]: Invalid user www-data from 51.159.35.94 port 60708 Dec 19 18:18:25 OPSO sshd\[24782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.159.35.94 |
2019-12-20 01:45:25 |
85.234.145.20 | attackspam | Dec 19 18:30:25 sd-53420 sshd\[6348\]: Invalid user maisa from 85.234.145.20 Dec 19 18:30:25 sd-53420 sshd\[6348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.145.20 Dec 19 18:30:27 sd-53420 sshd\[6348\]: Failed password for invalid user maisa from 85.234.145.20 port 34253 ssh2 Dec 19 18:35:21 sd-53420 sshd\[8148\]: Invalid user gavra from 85.234.145.20 Dec 19 18:35:21 sd-53420 sshd\[8148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.145.20 ... |
2019-12-20 01:42:06 |
200.48.214.19 | attack | Dec 19 07:08:07 tdfoods sshd\[9095\]: Invalid user netscreen from 200.48.214.19 Dec 19 07:08:07 tdfoods sshd\[9095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.48.214.19 Dec 19 07:08:09 tdfoods sshd\[9095\]: Failed password for invalid user netscreen from 200.48.214.19 port 23237 ssh2 Dec 19 07:15:39 tdfoods sshd\[9925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.48.214.19 user=root Dec 19 07:15:41 tdfoods sshd\[9925\]: Failed password for root from 200.48.214.19 port 32897 ssh2 |
2019-12-20 01:22:12 |
37.107.184.146 | attackbotsspam | Brute force SMTP login attempts. |
2019-12-20 01:13:37 |