City: unknown
Region: unknown
Country: Czechia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.216.50.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.216.50.119. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 23:06:30 CST 2025
;; MSG SIZE rcvd: 107
Host 119.50.216.160.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 119.50.216.160.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 183.89.79.48 | attackbots | 1601670890 - 10/02/2020 22:34:50 Host: 183.89.79.48/183.89.79.48 Port: 445 TCP Blocked ... |
2020-10-03 19:04:50 |
| 111.72.196.94 | attackspambots | Oct 3 00:38:02 srv01 postfix/smtpd\[5317\]: warning: unknown\[111.72.196.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 00:38:13 srv01 postfix/smtpd\[5317\]: warning: unknown\[111.72.196.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 00:38:29 srv01 postfix/smtpd\[5317\]: warning: unknown\[111.72.196.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 00:38:47 srv01 postfix/smtpd\[5317\]: warning: unknown\[111.72.196.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 00:38:59 srv01 postfix/smtpd\[5317\]: warning: unknown\[111.72.196.94\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-03 18:52:09 |
| 142.44.170.9 | attackbots | SpamScore above: 10.0 |
2020-10-03 19:02:16 |
| 139.99.238.150 | attackbots | Oct 3 08:51:54 itv-usvr-01 sshd[28621]: Invalid user cloudera from 139.99.238.150 Oct 3 08:51:54 itv-usvr-01 sshd[28621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.238.150 Oct 3 08:51:54 itv-usvr-01 sshd[28621]: Invalid user cloudera from 139.99.238.150 Oct 3 08:51:56 itv-usvr-01 sshd[28621]: Failed password for invalid user cloudera from 139.99.238.150 port 56232 ssh2 |
2020-10-03 19:07:48 |
| 200.60.91.42 | attack | TCP ports : 5226 / 16402 |
2020-10-03 18:34:18 |
| 180.76.157.174 | attackspambots | Invalid user student1 from 180.76.157.174 port 34354 |
2020-10-03 19:08:30 |
| 213.150.206.88 | attackspambots | 2020-10-03T12:14:07.360034cyberdyne sshd[30331]: Failed password for invalid user anurag from 213.150.206.88 port 49038 ssh2 2020-10-03T12:18:29.486638cyberdyne sshd[31212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.150.206.88 user=root 2020-10-03T12:18:31.277875cyberdyne sshd[31212]: Failed password for root from 213.150.206.88 port 53882 ssh2 2020-10-03T12:22:43.477448cyberdyne sshd[32009]: Invalid user nick from 213.150.206.88 port 58726 ... |
2020-10-03 18:36:45 |
| 116.196.81.216 | attack | Oct 3 12:27:55 abendstille sshd\[13881\]: Invalid user marcel from 116.196.81.216 Oct 3 12:27:55 abendstille sshd\[13881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.81.216 Oct 3 12:27:58 abendstille sshd\[13881\]: Failed password for invalid user marcel from 116.196.81.216 port 58196 ssh2 Oct 3 12:30:13 abendstille sshd\[16434\]: Invalid user james from 116.196.81.216 Oct 3 12:30:13 abendstille sshd\[16434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.81.216 ... |
2020-10-03 18:46:35 |
| 51.91.111.10 | attackspam | Oct 3 03:10:07 ny01 sshd[8093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.111.10 Oct 3 03:10:10 ny01 sshd[8093]: Failed password for invalid user ec2-user from 51.91.111.10 port 34726 ssh2 Oct 3 03:14:12 ny01 sshd[8665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.111.10 |
2020-10-03 18:32:22 |
| 85.209.0.103 | attackbotsspam | Automatic report BANNED IP |
2020-10-03 18:37:30 |
| 159.89.91.67 | attackbots | Oct 3 11:39:43 mavik sshd[27385]: Failed password for invalid user postgres from 159.89.91.67 port 44890 ssh2 Oct 3 11:47:03 mavik sshd[27595]: Invalid user dasusr1 from 159.89.91.67 Oct 3 11:47:03 mavik sshd[27595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.91.67 Oct 3 11:47:05 mavik sshd[27595]: Failed password for invalid user dasusr1 from 159.89.91.67 port 50232 ssh2 Oct 3 11:49:45 mavik sshd[27669]: Invalid user kuku from 159.89.91.67 ... |
2020-10-03 18:54:31 |
| 167.172.163.162 | attackspam | Oct 2 21:05:30 auw2 sshd\[983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.163.162 user=root Oct 2 21:05:32 auw2 sshd\[983\]: Failed password for root from 167.172.163.162 port 46304 ssh2 Oct 2 21:09:00 auw2 sshd\[1225\]: Invalid user system from 167.172.163.162 Oct 2 21:09:00 auw2 sshd\[1225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.163.162 Oct 2 21:09:02 auw2 sshd\[1225\]: Failed password for invalid user system from 167.172.163.162 port 54320 ssh2 |
2020-10-03 19:04:15 |
| 78.161.82.194 | attackbots | SSH bruteforce |
2020-10-03 19:07:17 |
| 212.64.43.52 | attackspam | $f2bV_matches |
2020-10-03 19:15:38 |
| 114.5.199.201 | attackbots | Subject: OK.... |
2020-10-03 18:37:02 |