City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.14.241.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7921
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.14.241.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 22:43:25 CST 2025
;; MSG SIZE rcvd: 107
Host 149.241.14.166.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.241.14.166.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.102.56.216 | attack | SmallBizIT.US 3 packets to udp(40748,40751,40752) |
2020-07-18 12:24:41 |
| 222.186.180.142 | attack | Jul 18 06:41:29 abendstille sshd\[3987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142 user=root Jul 18 06:41:31 abendstille sshd\[3987\]: Failed password for root from 222.186.180.142 port 16015 ssh2 Jul 18 06:41:42 abendstille sshd\[4123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142 user=root Jul 18 06:41:44 abendstille sshd\[4123\]: Failed password for root from 222.186.180.142 port 47260 ssh2 Jul 18 06:42:02 abendstille sshd\[4384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142 user=root ... |
2020-07-18 12:49:01 |
| 106.52.81.37 | attackspam | Jul 18 06:09:49 meumeu sshd[914566]: Invalid user wordpress from 106.52.81.37 port 33636 Jul 18 06:09:49 meumeu sshd[914566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.81.37 Jul 18 06:09:49 meumeu sshd[914566]: Invalid user wordpress from 106.52.81.37 port 33636 Jul 18 06:09:51 meumeu sshd[914566]: Failed password for invalid user wordpress from 106.52.81.37 port 33636 ssh2 Jul 18 06:14:24 meumeu sshd[914758]: Invalid user scp from 106.52.81.37 port 48988 Jul 18 06:14:24 meumeu sshd[914758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.81.37 Jul 18 06:14:24 meumeu sshd[914758]: Invalid user scp from 106.52.81.37 port 48988 Jul 18 06:14:25 meumeu sshd[914758]: Failed password for invalid user scp from 106.52.81.37 port 48988 ssh2 Jul 18 06:19:13 meumeu sshd[914963]: Invalid user caspar from 106.52.81.37 port 59108 ... |
2020-07-18 12:25:51 |
| 141.98.9.157 | attackbots | Jul 18 06:23:59 localhost sshd\[4567\]: Invalid user admin from 141.98.9.157 Jul 18 06:24:00 localhost sshd\[4567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157 Jul 18 06:24:02 localhost sshd\[4567\]: Failed password for invalid user admin from 141.98.9.157 port 43171 ssh2 Jul 18 06:24:22 localhost sshd\[4586\]: Invalid user test from 141.98.9.157 Jul 18 06:24:22 localhost sshd\[4586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157 ... |
2020-07-18 12:29:55 |
| 187.141.53.35 | attackspambots | Jul 18 06:28:03 vps639187 sshd\[20825\]: Invalid user martin from 187.141.53.35 port 58002 Jul 18 06:28:03 vps639187 sshd\[20825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.53.35 Jul 18 06:28:05 vps639187 sshd\[20825\]: Failed password for invalid user martin from 187.141.53.35 port 58002 ssh2 ... |
2020-07-18 12:28:09 |
| 112.85.42.229 | attackspam | $f2bV_matches |
2020-07-18 12:27:52 |
| 106.12.59.245 | attackbotsspam | Total attacks: 2 |
2020-07-18 12:45:56 |
| 80.218.60.250 | attackbotsspam | Jul 18 06:55:40 www1 sshd\[47038\]: Invalid user admin from 80.218.60.250Jul 18 06:55:42 www1 sshd\[47038\]: Failed password for invalid user admin from 80.218.60.250 port 36925 ssh2Jul 18 06:55:45 www1 sshd\[47040\]: Failed password for root from 80.218.60.250 port 37023 ssh2Jul 18 06:55:46 www1 sshd\[47042\]: Invalid user admin from 80.218.60.250Jul 18 06:55:48 www1 sshd\[47042\]: Failed password for invalid user admin from 80.218.60.250 port 37118 ssh2Jul 18 06:55:49 www1 sshd\[47044\]: Invalid user admin from 80.218.60.250 ... |
2020-07-18 12:55:13 |
| 129.28.191.35 | attackbots | Jul 18 05:57:56 ns382633 sshd\[28435\]: Invalid user db2inst1 from 129.28.191.35 port 59014 Jul 18 05:57:56 ns382633 sshd\[28435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.191.35 Jul 18 05:57:58 ns382633 sshd\[28435\]: Failed password for invalid user db2inst1 from 129.28.191.35 port 59014 ssh2 Jul 18 06:14:57 ns382633 sshd\[31535\]: Invalid user john from 129.28.191.35 port 34282 Jul 18 06:14:57 ns382633 sshd\[31535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.191.35 |
2020-07-18 12:35:05 |
| 196.52.84.39 | attackspam | (From pcc2dv8@transat.com) Рassivе Inсome Ideа 2020: 15454 ЕUR / Mоnat: http://klxqiub.trans-pacificlogistics.com/8001 Vеrdienеn Sie Gеld online - 17796 EUR + passives Einkоmmen: http://ntsjwpogq.thegreasealliance.com/ef456 Pаssivеs Einкommеn: Wеg, um 15955 ЕUR prо Моnаt vоn zu Наuse aus zu verdienen: http://bhewxb.dmlrealestateinvesting.com/19b Gеnerieren Siе еin monаtliсhes раssivеs Еinкommеn vоn 14749 EUR: http://jaozg.cschan.website/4d11fd8e6 Sо еrhаlten Sie ein passives Еinkommen von 14996 EUR / Monаt: http://mxgc.oxoo.site/e572cd399 |
2020-07-18 12:50:00 |
| 134.17.94.158 | attackbotsspam | ssh brute force |
2020-07-18 12:48:07 |
| 40.81.145.233 | attackbotsspam | Jul 18 06:42:01 ArkNodeAT sshd\[14406\]: Invalid user admin from 40.81.145.233 Jul 18 06:42:01 ArkNodeAT sshd\[14406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.81.145.233 Jul 18 06:42:03 ArkNodeAT sshd\[14406\]: Failed password for invalid user admin from 40.81.145.233 port 7014 ssh2 |
2020-07-18 12:46:33 |
| 178.128.123.111 | attack | Jul 18 06:58:37 minden010 sshd[29224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111 Jul 18 06:58:39 minden010 sshd[29224]: Failed password for invalid user sniffer from 178.128.123.111 port 39654 ssh2 Jul 18 07:01:48 minden010 sshd[29673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111 ... |
2020-07-18 13:02:04 |
| 40.85.226.217 | attackspambots | Jul 18 11:11:55 webhost01 sshd[16373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.85.226.217 Jul 18 11:11:56 webhost01 sshd[16373]: Failed password for invalid user admin from 40.85.226.217 port 33046 ssh2 ... |
2020-07-18 12:30:19 |
| 114.67.241.174 | attack | Jul 17 22:17:17 server1 sshd\[24408\]: Failed password for invalid user appluat from 114.67.241.174 port 62050 ssh2 Jul 17 22:21:30 server1 sshd\[25559\]: Invalid user webadmin from 114.67.241.174 Jul 17 22:21:30 server1 sshd\[25559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.241.174 Jul 17 22:21:32 server1 sshd\[25559\]: Failed password for invalid user webadmin from 114.67.241.174 port 47914 ssh2 Jul 17 22:25:57 server1 sshd\[26839\]: Invalid user fmaster from 114.67.241.174 ... |
2020-07-18 12:43:25 |