City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.16.149.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.16.149.128. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:32:14 CST 2025
;; MSG SIZE rcvd: 107
Host 128.149.16.164.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 128.149.16.164.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.110.128.210 | attack | Jun 1 22:15:48 h2829583 sshd[17824]: Failed password for root from 212.110.128.210 port 35130 ssh2 |
2020-06-02 08:04:57 |
| 119.29.187.218 | attack | 2020-06-02T01:13:00.125204v22018076590370373 sshd[6647]: Failed password for root from 119.29.187.218 port 43134 ssh2 2020-06-02T01:15:58.628923v22018076590370373 sshd[2503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.187.218 user=root 2020-06-02T01:16:00.162000v22018076590370373 sshd[2503]: Failed password for root from 119.29.187.218 port 34808 ssh2 2020-06-02T01:18:45.894555v22018076590370373 sshd[18644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.187.218 user=root 2020-06-02T01:18:48.357977v22018076590370373 sshd[18644]: Failed password for root from 119.29.187.218 port 54707 ssh2 ... |
2020-06-02 07:56:35 |
| 51.79.8.34 | attack | RDP Brute-Force (honeypot 11) |
2020-06-02 08:24:03 |
| 185.220.102.7 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-06-02 07:53:39 |
| 52.1.170.90 | attackbots | TCP Port: 443 invalid blocked rbldns-ru Client xx.xx.4.123 (281) |
2020-06-02 08:16:25 |
| 188.165.255.134 | attackbotsspam | 188.165.255.134 - - [01/Jun/2020:23:17:12 +0200] "GET /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 188.165.255.134 - - [01/Jun/2020:23:17:14 +0200] "POST /wp-login.php HTTP/1.1" 200 6517 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 188.165.255.134 - - [01/Jun/2020:23:17:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-02 08:25:00 |
| 94.23.103.187 | attackspambots | Multiple malicious Wordpress attacks |
2020-06-02 08:15:09 |
| 170.78.21.211 | attackbots | Unauthorized connection attempt from IP address 170.78.21.211 on Port 445(SMB) |
2020-06-02 08:14:20 |
| 175.97.137.193 | attack | 2020-06-01T20:13:36.165919shield sshd\[24539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175-97-137-193.dynamic.tfn.net.tw user=root 2020-06-01T20:13:38.561036shield sshd\[24539\]: Failed password for root from 175.97.137.193 port 47494 ssh2 2020-06-01T20:14:30.338119shield sshd\[24622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175-97-137-193.dynamic.tfn.net.tw user=root 2020-06-01T20:14:32.812173shield sshd\[24622\]: Failed password for root from 175.97.137.193 port 58384 ssh2 2020-06-01T20:15:31.145757shield sshd\[24754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175-97-137-193.dynamic.tfn.net.tw user=root |
2020-06-02 08:17:27 |
| 117.50.65.85 | attack | Jun 2 00:03:58 ns382633 sshd\[21842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 user=root Jun 2 00:03:59 ns382633 sshd\[21842\]: Failed password for root from 117.50.65.85 port 60330 ssh2 Jun 2 00:16:11 ns382633 sshd\[24538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 user=root Jun 2 00:16:13 ns382633 sshd\[24538\]: Failed password for root from 117.50.65.85 port 52882 ssh2 Jun 2 00:19:20 ns382633 sshd\[24860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 user=root |
2020-06-02 07:52:43 |
| 162.243.144.110 | attackspambots | Suspicious activity \(400 Bad Request\) |
2020-06-02 08:19:25 |
| 197.249.238.204 | attack | Unauthorized connection attempt from IP address 197.249.238.204 on Port 445(SMB) |
2020-06-02 07:49:57 |
| 217.173.76.27 | attack | Jun 1 21:28:58 sip sshd[20141]: Failed password for root from 217.173.76.27 port 41443 ssh2 Jun 1 22:02:38 sip sshd[32730]: Failed password for root from 217.173.76.27 port 34137 ssh2 |
2020-06-02 08:03:39 |
| 190.207.154.246 | attackbotsspam | Unauthorized connection attempt from IP address 190.207.154.246 on Port 445(SMB) |
2020-06-02 08:22:17 |
| 211.22.154.223 | attackbotsspam | Jun 1 18:18:01 NPSTNNYC01T sshd[21868]: Failed password for root from 211.22.154.223 port 48204 ssh2 Jun 1 18:21:51 NPSTNNYC01T sshd[22165]: Failed password for root from 211.22.154.223 port 52384 ssh2 ... |
2020-06-02 07:48:47 |