City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.145.45.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.145.45.195. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:06:18 CST 2025
;; MSG SIZE rcvd: 107
Host 195.45.145.168.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 195.45.145.168.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.139.26 | attackbotsspam | Dec 17 23:59:34 loxhost sshd\[24482\]: Invalid user currans from 106.13.139.26 port 54856 Dec 17 23:59:35 loxhost sshd\[24482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26 Dec 17 23:59:36 loxhost sshd\[24482\]: Failed password for invalid user currans from 106.13.139.26 port 54856 ssh2 Dec 18 00:06:07 loxhost sshd\[24694\]: Invalid user fabiana from 106.13.139.26 port 55860 Dec 18 00:06:07 loxhost sshd\[24694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.26 ... |
2019-12-18 07:09:12 |
| 94.232.173.233 | attackbotsspam | Dec 16 09:56:48 penfold sshd[27979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.173.233 user=r.r Dec 16 09:56:50 penfold sshd[27979]: Failed password for r.r from 94.232.173.233 port 48946 ssh2 Dec 16 09:56:50 penfold sshd[27979]: Received disconnect from 94.232.173.233 port 48946:11: Bye Bye [preauth] Dec 16 09:56:50 penfold sshd[27979]: Disconnected from 94.232.173.233 port 48946 [preauth] Dec 16 10:06:41 penfold sshd[28505]: Invalid user okine from 94.232.173.233 port 57098 Dec 16 10:06:41 penfold sshd[28505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.173.233 Dec 16 10:06:44 penfold sshd[28505]: Failed password for invalid user okine from 94.232.173.233 port 57098 ssh2 Dec 16 10:06:44 penfold sshd[28505]: Received disconnect from 94.232.173.233 port 57098:11: Bye Bye [preauth] Dec 16 10:06:44 penfold sshd[28505]: Disconnected from 94.232.173.233 port 57098 [prea........ ------------------------------- |
2019-12-18 07:59:10 |
| 114.41.67.11 | attackspam | 1576621542 - 12/17/2019 23:25:42 Host: 114.41.67.11/114.41.67.11 Port: 445 TCP Blocked |
2019-12-18 08:05:24 |
| 104.236.22.133 | attackspam | Dec 18 00:28:11 legacy sshd[17080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133 Dec 18 00:28:13 legacy sshd[17080]: Failed password for invalid user micailah from 104.236.22.133 port 35560 ssh2 Dec 18 00:33:26 legacy sshd[17316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133 ... |
2019-12-18 07:46:07 |
| 81.133.73.161 | attackspam | Invalid user nevarez from 81.133.73.161 port 55251 |
2019-12-18 07:12:40 |
| 130.83.161.131 | attackspam | Lines containing failures of 130.83.161.131 Dec 16 06:44:52 shared02 sshd[8767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.83.161.131 user=nobody Dec 16 06:44:54 shared02 sshd[8767]: Failed password for nobody from 130.83.161.131 port 38288 ssh2 Dec 16 06:44:54 shared02 sshd[8767]: Received disconnect from 130.83.161.131 port 38288:11: Bye Bye [preauth] Dec 16 06:44:54 shared02 sshd[8767]: Disconnected from authenticating user nobody 130.83.161.131 port 38288 [preauth] Dec 16 07:11:10 shared02 sshd[18447]: Invalid user anne-marie from 130.83.161.131 port 56106 Dec 16 07:11:10 shared02 sshd[18447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.83.161.131 Dec 16 07:11:12 shared02 sshd[18447]: Failed password for invalid user anne-marie from 130.83.161.131 port 56106 ssh2 Dec 16 07:11:12 shared02 sshd[18447]: Received disconnect from 130.83.161.131 port 56106:11: Bye Bye [preaut........ ------------------------------ |
2019-12-18 07:32:34 |
| 178.62.90.135 | attackspambots | Dec 17 22:20:52 zeus sshd[8916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.90.135 Dec 17 22:20:54 zeus sshd[8916]: Failed password for invalid user pzserver from 178.62.90.135 port 52691 ssh2 Dec 17 22:26:06 zeus sshd[9074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.90.135 Dec 17 22:26:07 zeus sshd[9074]: Failed password for invalid user linkin from 178.62.90.135 port 57672 ssh2 |
2019-12-18 07:33:21 |
| 117.2.139.91 | attack | 1576621576 - 12/17/2019 23:26:16 Host: 117.2.139.91/117.2.139.91 Port: 445 TCP Blocked |
2019-12-18 07:26:14 |
| 123.135.127.85 | attackspam | Dec 16 02:18:35 : SSH login attempts with invalid user |
2019-12-18 07:45:32 |
| 45.119.212.222 | attackspambots | 45.119.212.222 - - \[18/Dec/2019:00:41:17 +0100\] "POST /wp-login.php HTTP/1.0" 200 7544 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 45.119.212.222 - - \[18/Dec/2019:00:41:22 +0100\] "POST /wp-login.php HTTP/1.0" 200 7411 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 45.119.212.222 - - \[18/Dec/2019:00:41:25 +0100\] "POST /wp-login.php HTTP/1.0" 200 7407 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-12-18 07:46:37 |
| 31.46.16.95 | attackspambots | Dec 17 17:52:24 ny01 sshd[25730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.16.95 Dec 17 17:52:25 ny01 sshd[25730]: Failed password for invalid user akhan from 31.46.16.95 port 39524 ssh2 Dec 17 17:57:42 ny01 sshd[26600]: Failed password for lp from 31.46.16.95 port 48102 ssh2 |
2019-12-18 06:59:42 |
| 192.99.36.177 | attackspam | 192.99.36.177 - - [18/Dec/2019:00:56:15 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:16 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:16 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:17 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:17 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 |
2019-12-18 07:58:29 |
| 129.204.50.75 | attackbots | Dec 17 23:18:24 XXX sshd[47315]: Invalid user elysa from 129.204.50.75 port 45946 |
2019-12-18 08:08:08 |
| 125.165.176.72 | attackbotsspam | 3389BruteforceFW21 |
2019-12-18 07:19:23 |
| 58.213.198.77 | attackbotsspam | Nov 25 00:59:49 vtv3 sshd[11620]: Failed password for invalid user pierre from 58.213.198.77 port 51972 ssh2 Nov 25 01:03:50 vtv3 sshd[14117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77 Nov 25 01:15:31 vtv3 sshd[22944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77 Nov 25 01:15:33 vtv3 sshd[22944]: Failed password for invalid user myrhodesiaiscom from 58.213.198.77 port 50874 ssh2 Nov 25 01:19:30 vtv3 sshd[25080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77 Nov 25 01:31:13 vtv3 sshd[772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77 Nov 25 01:31:14 vtv3 sshd[772]: Failed password for invalid user miguel from 58.213.198.77 port 47934 ssh2 Nov 25 01:35:08 vtv3 sshd[3069]: Failed password for root from 58.213.198.77 port 33154 ssh2 Nov 25 01:46:54 vtv3 sshd[10278]: pam_unix(sshd:aut |
2019-12-18 07:09:55 |