City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.2.40.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.2.40.48. IN A
;; AUTHORITY SECTION:
. 208 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400
;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:15:13 CST 2022
;; MSG SIZE rcvd: 104
48.40.2.174.in-addr.arpa domain name pointer S01063cb74bfcd0c5.pr.shawcable.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.40.2.174.in-addr.arpa name = S01063cb74bfcd0c5.pr.shawcable.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.254.61.60 | attackbotsspam | Nov 8 12:53:14 yesfletchmain sshd\[5857\]: User root from 119.254.61.60 not allowed because not listed in AllowUsers Nov 8 12:53:14 yesfletchmain sshd\[5857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.61.60 user=root Nov 8 12:53:16 yesfletchmain sshd\[5857\]: Failed password for invalid user root from 119.254.61.60 port 5710 ssh2 Nov 8 12:59:38 yesfletchmain sshd\[5966\]: Invalid user upgrade from 119.254.61.60 port 11558 Nov 8 12:59:38 yesfletchmain sshd\[5966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.61.60 ... |
2019-11-08 21:01:39 |
| 103.56.113.69 | attackspambots | 2019-11-08T09:47:43.137953shield sshd\[23453\]: Invalid user 12345678 from 103.56.113.69 port 45780 2019-11-08T09:47:43.143850shield sshd\[23453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69 2019-11-08T09:47:45.162401shield sshd\[23453\]: Failed password for invalid user 12345678 from 103.56.113.69 port 45780 ssh2 2019-11-08T09:52:22.270667shield sshd\[24019\]: Invalid user !@\#\$qwerASDF from 103.56.113.69 port 36766 2019-11-08T09:52:22.275162shield sshd\[24019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69 |
2019-11-08 20:33:23 |
| 189.212.142.60 | attackspam | Automatic report - Port Scan Attack |
2019-11-08 20:34:23 |
| 45.125.66.26 | attackspam | \[2019-11-08 07:16:04\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-08T07:16:04.364-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4152701148525260109",SessionID="0x7fdf2c10bc68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.26/49683",ACLName="no_extension_match" \[2019-11-08 07:16:10\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-08T07:16:10.631-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4485901148825681007",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.26/52064",ACLName="no_extension_match" \[2019-11-08 07:16:32\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-08T07:16:32.905-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4818401148236518001",SessionID="0x7fdf2c1fc408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.26/63191",ACLNam |
2019-11-08 20:29:00 |
| 198.8.93.14 | attackspambots | 2019-11-08T13:01:45.151606mail01 postfix/smtpd[20840]: warning: unknown[198.8.93.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-08T13:04:55.046328mail01 postfix/smtpd[20840]: warning: unknown[198.8.93.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-08T13:11:16.307304mail01 postfix/smtpd[18603]: warning: unknown[198.8.93.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-08 20:33:53 |
| 203.69.238.48 | attack | Unauthorised access (Nov 8) SRC=203.69.238.48 LEN=40 PREC=0x20 TTL=242 ID=8427 DF TCP DPT=23 WINDOW=14600 SYN |
2019-11-08 20:42:35 |
| 80.211.67.90 | attackbots | Nov 8 02:27:04 plusreed sshd[5903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90 user=root Nov 8 02:27:06 plusreed sshd[5903]: Failed password for root from 80.211.67.90 port 43586 ssh2 ... |
2019-11-08 20:30:51 |
| 122.102.44.66 | attackspambots | F2B jail: sshd. Time: 2019-11-08 13:21:40, Reported by: VKReport |
2019-11-08 20:36:51 |
| 112.85.42.237 | attackbots | SSH Brute Force, server-1 sshd[21575]: Failed password for root from 112.85.42.237 port 58241 ssh2 |
2019-11-08 20:37:45 |
| 59.54.57.52 | attackspambots | Unauthorised access (Nov 8) SRC=59.54.57.52 LEN=52 TTL=113 ID=25569 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-08 20:44:29 |
| 1.32.35.62 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2019-11-08 20:51:32 |
| 212.237.62.168 | attackspambots | Nov 8 09:27:03 vpn01 sshd[4618]: Failed password for root from 212.237.62.168 port 52752 ssh2 ... |
2019-11-08 20:48:45 |
| 92.118.38.54 | attackspam | Nov 8 13:12:58 andromeda postfix/smtpd\[27947\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure Nov 8 13:13:10 andromeda postfix/smtpd\[23621\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure Nov 8 13:13:11 andromeda postfix/smtpd\[20897\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure Nov 8 13:13:37 andromeda postfix/smtpd\[24948\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure Nov 8 13:13:50 andromeda postfix/smtpd\[20897\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure |
2019-11-08 20:18:17 |
| 81.22.45.116 | attack | Nov 8 13:13:35 h2177944 kernel: \[6090818.892054\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=43016 PROTO=TCP SPT=49986 DPT=54869 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 13:16:10 h2177944 kernel: \[6090973.395295\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=62607 PROTO=TCP SPT=49986 DPT=54894 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 13:20:59 h2177944 kernel: \[6091262.122555\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=30885 PROTO=TCP SPT=49986 DPT=55136 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 13:24:23 h2177944 kernel: \[6091466.416371\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12119 PROTO=TCP SPT=49986 DPT=54585 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 13:29:36 h2177944 kernel: \[6091779.043442\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.116 DST=85.214.117.9 |
2019-11-08 20:35:45 |
| 168.181.49.68 | attack | Lines containing failures of 168.181.49.68 (max 1000) Nov 7 11:26:08 mm sshd[28207]: Invalid user nxautomation from 168.181.= 49.68 port 9979 Nov 7 11:26:08 mm sshd[28207]: pam_unix(sshd:auth): authentication fai= lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D168.181.49= .68 Nov 7 11:26:10 mm sshd[28207]: Failed password for invalid user nxauto= mation from 168.181.49.68 port 9979 ssh2 Nov 7 11:26:11 mm sshd[28207]: Received disconnect from 168.181.49.68 = port 9979:11: Bye Bye [preauth] Nov 7 11:26:11 mm sshd[28207]: Disconnected from invalid user nxautoma= tion 168.181.49.68 port 9979 [preauth] Nov 7 11:30:36 mm sshd[28300]: pam_unix(sshd:auth): authentication fai= lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D168.181.49= .68 user=3Dr.r Nov 7 11:30:37 mm sshd[28300]: Failed password for r.r from 168.181.4= 9.68 port 13286 ssh2 Nov 7 11:30:38 mm sshd[28300]: Received disconnect from 168.181.49.68 = port 13286:11: Bye Bye [preauth] ........ ------------------------------ |
2019-11-08 20:36:19 |