City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.94.168.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.94.168.50. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:11:33 CST 2025
;; MSG SIZE rcvd: 106
Host 50.168.94.164.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.168.94.164.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
27.254.34.155 | attackbotsspam | 1599238276 - 09/04/2020 18:51:16 Host: 27.254.34.155/27.254.34.155 Port: 445 TCP Blocked |
2020-09-05 14:00:09 |
191.232.193.0 | attack | (sshd) Failed SSH login from 191.232.193.0 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 4 21:13:01 server2 sshd[7381]: Invalid user status from 191.232.193.0 Sep 4 21:13:01 server2 sshd[7381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.193.0 Sep 4 21:13:03 server2 sshd[7381]: Failed password for invalid user status from 191.232.193.0 port 35612 ssh2 Sep 4 21:33:45 server2 sshd[25441]: Invalid user dines from 191.232.193.0 Sep 4 21:33:45 server2 sshd[25441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.193.0 |
2020-09-05 14:15:54 |
82.115.213.204 | attack | REQUESTED PAGE: /wp-json/contact-form-7/v1/contact-forms/382/feedback |
2020-09-05 14:18:58 |
183.194.212.16 | attackspam | Sep 5 05:35:29 [host] sshd[16930]: Invalid user t Sep 5 05:35:29 [host] sshd[16930]: pam_unix(sshd: Sep 5 05:35:31 [host] sshd[16930]: Failed passwor |
2020-09-05 14:36:02 |
159.89.139.110 | attackbotsspam | 159.89.139.110 - - [04/Sep/2020:17:50:59 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.89.139.110 - - [04/Sep/2020:17:51:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.89.139.110 - - [04/Sep/2020:17:51:07 +0100] "POST /wp-login.php HTTP/1.1" 200 1949 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-05 14:09:05 |
222.186.175.151 | attack | 2020-09-05T08:07:40.202961ns386461 sshd\[4665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root 2020-09-05T08:07:42.666423ns386461 sshd\[4665\]: Failed password for root from 222.186.175.151 port 41434 ssh2 2020-09-05T08:07:46.089633ns386461 sshd\[4665\]: Failed password for root from 222.186.175.151 port 41434 ssh2 2020-09-05T08:07:49.426528ns386461 sshd\[4665\]: Failed password for root from 222.186.175.151 port 41434 ssh2 2020-09-05T08:07:52.478244ns386461 sshd\[4665\]: Failed password for root from 222.186.175.151 port 41434 ssh2 ... |
2020-09-05 14:24:28 |
223.206.67.77 | attack | port |
2020-09-05 14:13:29 |
190.38.27.203 | attackbotsspam | Honeypot attack, port: 445, PTR: 190-38-27-203.dyn.dsl.cantv.net. |
2020-09-05 14:08:21 |
222.186.169.194 | attack | $f2bV_matches |
2020-09-05 14:18:00 |
106.13.237.235 | attackspambots | Invalid user vbox from 106.13.237.235 port 44720 |
2020-09-05 14:31:53 |
73.205.95.188 | attackbotsspam | Automatic report - Port Scan Attack |
2020-09-05 14:06:45 |
122.51.166.84 | attackspam | Invalid user oficina from 122.51.166.84 port 42726 |
2020-09-05 14:04:45 |
51.195.136.190 | attack | 2020-09-05T05:14:05.312854vps-d63064a2 sshd[37814]: User root from 51.195.136.190 not allowed because not listed in AllowUsers 2020-09-05T05:14:07.105926vps-d63064a2 sshd[37814]: Failed password for invalid user root from 51.195.136.190 port 44224 ssh2 2020-09-05T05:14:10.992835vps-d63064a2 sshd[37814]: Failed password for invalid user root from 51.195.136.190 port 44224 ssh2 2020-09-05T05:14:13.161947vps-d63064a2 sshd[37814]: Failed password for invalid user root from 51.195.136.190 port 44224 ssh2 2020-09-05T05:14:15.991451vps-d63064a2 sshd[37814]: error: maximum authentication attempts exceeded for invalid user root from 51.195.136.190 port 44224 ssh2 [preauth] 2020-09-05T05:14:17.138915vps-d63064a2 sshd[37817]: User root from 51.195.136.190 not allowed because not listed in AllowUsers ... |
2020-09-05 14:16:20 |
85.95.153.59 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-05 14:03:37 |
45.141.87.5 | attack | RDP brute forcing (d) |
2020-09-05 14:26:38 |