City: unknown
Region: unknown
Country: Russian Federation (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.75.80.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;178.75.80.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 02:54:49 CST 2025
;; MSG SIZE rcvd: 106
Host 214.80.75.178.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.80.75.178.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 193.202.45.202 | attackbotsspam | Excessive unauthorized requests: 5060 |
2020-04-19 20:03:06 |
| 139.59.60.220 | attackspambots | Apr 19 16:29:16 gw1 sshd[15587]: Failed password for root from 139.59.60.220 port 42710 ssh2 ... |
2020-04-19 19:37:43 |
| 45.143.220.48 | attackbotsspam | 45.143.220.48 was recorded 6 times by 2 hosts attempting to connect to the following ports: 4460,6660,7760. Incident counter (4h, 24h, all-time): 6, 24, 343 |
2020-04-19 19:55:34 |
| 120.5.132.64 | attack | Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP] |
2020-04-19 20:02:26 |
| 139.59.43.6 | attackspam | (sshd) Failed SSH login from 139.59.43.6 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 12:28:36 srv sshd[26625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6 user=root Apr 19 12:28:38 srv sshd[26625]: Failed password for root from 139.59.43.6 port 45636 ssh2 Apr 19 12:34:37 srv sshd[26793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.43.6 user=root Apr 19 12:34:39 srv sshd[26793]: Failed password for root from 139.59.43.6 port 38394 ssh2 Apr 19 12:40:18 srv sshd[27028]: Invalid user test from 139.59.43.6 port 54816 |
2020-04-19 20:01:28 |
| 139.59.190.55 | attackspam | 2020-04-19T13:05:16.135648vps773228.ovh.net sshd[4872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.190.55 user=root 2020-04-19T13:05:18.008334vps773228.ovh.net sshd[4872]: Failed password for root from 139.59.190.55 port 36822 ssh2 2020-04-19T13:10:10.151189vps773228.ovh.net sshd[4962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.190.55 user=postfix 2020-04-19T13:10:12.049422vps773228.ovh.net sshd[4962]: Failed password for postfix from 139.59.190.55 port 56248 ssh2 2020-04-19T13:15:04.069440vps773228.ovh.net sshd[4996]: Invalid user ubuntu from 139.59.190.55 port 47442 ... |
2020-04-19 19:23:31 |
| 106.12.24.193 | attack | Apr 19 10:11:55 ns382633 sshd\[12393\]: Invalid user un from 106.12.24.193 port 38320 Apr 19 10:11:55 ns382633 sshd\[12393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.193 Apr 19 10:11:56 ns382633 sshd\[12393\]: Failed password for invalid user un from 106.12.24.193 port 38320 ssh2 Apr 19 10:23:16 ns382633 sshd\[15406\]: Invalid user admin from 106.12.24.193 port 38392 Apr 19 10:23:16 ns382633 sshd\[15406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.193 |
2020-04-19 19:53:27 |
| 58.213.90.34 | attackbotsspam | Bruteforce detected by fail2ban |
2020-04-19 19:27:27 |
| 222.186.52.139 | attackbots | Apr 19 13:53:36 plex sshd[20892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139 user=root Apr 19 13:53:38 plex sshd[20892]: Failed password for root from 222.186.52.139 port 17166 ssh2 |
2020-04-19 19:56:33 |
| 132.255.228.38 | attackspambots | SSH brute force attempt |
2020-04-19 19:44:22 |
| 51.158.68.26 | attackbotsspam | tried to spam in our blog comments: Hi! Welcome to new Sex-dating website: ->>>>>>>> url_detected:fastdates24 dot club Find your love right now! Register now! ->>>>>>>> url_detected:fastdates24 dot club dating sex dating sex dating free sex online dating sex dating sites sex dating for free adult dating sex dating sex online dating sex site sex dating porn erotic teen girl adult |
2020-04-19 19:21:14 |
| 168.197.31.14 | attackbots | Invalid user git from 168.197.31.14 port 48769 |
2020-04-19 20:03:29 |
| 94.191.24.214 | attack | odoo8 ... |
2020-04-19 19:21:00 |
| 59.51.67.207 | attackbots | (ftpd) Failed FTP login from 59.51.67.207 (CN/China/-): 10 in the last 3600 secs |
2020-04-19 19:47:16 |
| 156.54.173.75 | attack | 19.04.2020 11:44:55 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2020-04-19 19:36:02 |