City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.142.149.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28245
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.142.149.194. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:49:15 CST 2025
;; MSG SIZE rcvd: 108
Host 194.149.142.160.in-addr.arpa not found: 2(SERVFAIL)
server can't find 160.142.149.194.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
180.159.102.249 | attackbotsspam | Unauthorized connection attempt from IP address 180.159.102.249 on Port 445(SMB) |
2019-09-09 07:23:24 |
14.231.12.208 | attack | Unauthorized connection attempt from IP address 14.231.12.208 on Port 445(SMB) |
2019-09-09 07:53:30 |
114.234.82.78 | attackspam | Sep823:44:03server4pure-ftpd:\(\?@114.234.82.78\)[WARNING]Authenticationfailedforuser[www]Sep823:59:49server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:59:20server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:59:35server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:43:07server4pure-ftpd:\(\?@117.95.105.99\)[WARNING]Authenticationfailedforuser[www]Sep823:43:02server4pure-ftpd:\(\?@117.95.105.99\)[WARNING]Authenticationfailedforuser[www]Sep823:59:42server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:43:57server4pure-ftpd:\(\?@114.234.82.78\)[WARNING]Authenticationfailedforuser[www]Sep823:59:25server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]Sep823:59:26server4pure-ftpd:\(\?@129.204.230.125\)[WARNING]Authenticationfailedforuser[www]IPAddressesBlocked: |
2019-09-09 07:34:44 |
222.236.179.104 | attack | DATE:2019-09-08 21:30:29, IP:222.236.179.104, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-09-09 07:30:06 |
194.88.204.163 | attackspam | Sep 8 19:04:32 TORMINT sshd\[17173\]: Invalid user ubuntu from 194.88.204.163 Sep 8 19:04:32 TORMINT sshd\[17173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.88.204.163 Sep 8 19:04:34 TORMINT sshd\[17173\]: Failed password for invalid user ubuntu from 194.88.204.163 port 39676 ssh2 ... |
2019-09-09 07:10:06 |
125.162.104.150 | attack | Unauthorized connection attempt from IP address 125.162.104.150 on Port 445(SMB) |
2019-09-09 07:26:46 |
106.13.34.190 | attack | Sep 8 13:18:41 lcprod sshd\[31376\]: Invalid user mc from 106.13.34.190 Sep 8 13:18:41 lcprod sshd\[31376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.190 Sep 8 13:18:43 lcprod sshd\[31376\]: Failed password for invalid user mc from 106.13.34.190 port 41926 ssh2 Sep 8 13:20:13 lcprod sshd\[31506\]: Invalid user tester from 106.13.34.190 Sep 8 13:20:13 lcprod sshd\[31506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.190 |
2019-09-09 07:27:59 |
61.19.208.34 | attack | 445/tcp 445/tcp 445/tcp... [2019-07-19/09-08]5pkt,1pt.(tcp) |
2019-09-09 07:37:15 |
177.103.187.233 | attack | Sep 8 23:42:54 hb sshd\[26806\]: Invalid user csgoserver from 177.103.187.233 Sep 8 23:42:54 hb sshd\[26806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.187.233 Sep 8 23:42:56 hb sshd\[26806\]: Failed password for invalid user csgoserver from 177.103.187.233 port 41974 ssh2 Sep 8 23:49:47 hb sshd\[27373\]: Invalid user sinusbot from 177.103.187.233 Sep 8 23:49:47 hb sshd\[27373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.187.233 |
2019-09-09 07:53:07 |
123.58.251.117 | attack | Sep 8 13:08:27 php2 sshd\[19208\]: Invalid user usuario from 123.58.251.117 Sep 8 13:08:27 php2 sshd\[19208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.251.117 Sep 8 13:08:29 php2 sshd\[19208\]: Failed password for invalid user usuario from 123.58.251.117 port 53862 ssh2 Sep 8 13:13:09 php2 sshd\[19784\]: Invalid user csserver from 123.58.251.117 Sep 8 13:13:09 php2 sshd\[19784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.251.117 |
2019-09-09 07:32:05 |
146.4.22.190 | attackspam | This IP address was blacklisted for the following reason: /de/ @ 2019-09-01T09:03:56+02:00. |
2019-09-09 07:48:43 |
183.83.252.202 | attackspambots | Unauthorized connection attempt from IP address 183.83.252.202 on Port 445(SMB) |
2019-09-09 07:45:52 |
176.65.2.5 | attackbotsspam | This IP address was blacklisted for the following reason: /de/jobs/industriemechaniker-m-w/&%22%20or%20(1,2)=(select*from(select%20name_const(CHAR(111,78,69,75,117,76,116,86,103,101,104,75),1),name_const(CHAR(111,78,69,75,117,76,116,86,103,101,104,75),1))a)%20--%20%22x%22=%22x @ 2018-10-15T00:52:17+02:00. |
2019-09-09 07:51:10 |
60.190.159.142 | attack | Unauthorized connection attempt from IP address 60.190.159.142 on Port 445(SMB) |
2019-09-09 07:20:48 |
182.73.111.150 | attack | firewall-block, port(s): 8080/tcp |
2019-09-09 07:46:13 |