City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.26.44.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;19.26.44.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 16:00:48 CST 2025
;; MSG SIZE rcvd: 105
Host 161.44.26.19.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 161.44.26.19.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.252.249.73 | attackbots | 2020-07-14T00:58:54.262669server.mjenks.net sshd[1676725]: Invalid user practice from 45.252.249.73 port 49888 2020-07-14T00:58:54.268162server.mjenks.net sshd[1676725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.252.249.73 2020-07-14T00:58:54.262669server.mjenks.net sshd[1676725]: Invalid user practice from 45.252.249.73 port 49888 2020-07-14T00:58:56.451827server.mjenks.net sshd[1676725]: Failed password for invalid user practice from 45.252.249.73 port 49888 ssh2 2020-07-14T01:01:42.617572server.mjenks.net sshd[1677093]: Invalid user theo from 45.252.249.73 port 33234 ... |
2020-07-14 14:08:06 |
| 106.53.97.54 | attackspam | Jul 14 03:51:38 vlre-nyc-1 sshd\[11758\]: Invalid user web from 106.53.97.54 Jul 14 03:51:38 vlre-nyc-1 sshd\[11758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.97.54 Jul 14 03:51:40 vlre-nyc-1 sshd\[11758\]: Failed password for invalid user web from 106.53.97.54 port 40034 ssh2 Jul 14 03:54:54 vlre-nyc-1 sshd\[11862\]: Invalid user zimbra from 106.53.97.54 Jul 14 03:54:54 vlre-nyc-1 sshd\[11862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.97.54 ... |
2020-07-14 13:41:19 |
| 18.180.129.105 | attackspambots | 18.180.129.105 - - [14/Jul/2020:05:11:44 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 18.180.129.105 - - [14/Jul/2020:05:11:46 +0100] "POST /wp-login.php HTTP/1.1" 200 1685 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 18.180.129.105 - - [14/Jul/2020:05:11:47 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-14 14:20:08 |
| 5.135.224.152 | attackbotsspam | 2020-07-14T07:40:20.888842galaxy.wi.uni-potsdam.de sshd[18996]: Invalid user aw from 5.135.224.152 port 54530 2020-07-14T07:40:20.890757galaxy.wi.uni-potsdam.de sshd[18996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-5-135-224.eu 2020-07-14T07:40:20.888842galaxy.wi.uni-potsdam.de sshd[18996]: Invalid user aw from 5.135.224.152 port 54530 2020-07-14T07:40:22.828957galaxy.wi.uni-potsdam.de sshd[18996]: Failed password for invalid user aw from 5.135.224.152 port 54530 ssh2 2020-07-14T07:43:07.298612galaxy.wi.uni-potsdam.de sshd[19300]: Invalid user kyh from 5.135.224.152 port 47320 2020-07-14T07:43:07.300474galaxy.wi.uni-potsdam.de sshd[19300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-5-135-224.eu 2020-07-14T07:43:07.298612galaxy.wi.uni-potsdam.de sshd[19300]: Invalid user kyh from 5.135.224.152 port 47320 2020-07-14T07:43:08.812381galaxy.wi.uni-potsdam.de sshd[19300]: Failed pass ... |
2020-07-14 14:01:19 |
| 218.92.0.253 | attackspambots | SSH Brute-force |
2020-07-14 13:52:28 |
| 116.85.42.175 | attack | Jul 13 22:39:06 server1 sshd\[26949\]: Invalid user drake from 116.85.42.175 Jul 13 22:39:06 server1 sshd\[26949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.42.175 Jul 13 22:39:08 server1 sshd\[26949\]: Failed password for invalid user drake from 116.85.42.175 port 56342 ssh2 Jul 13 22:42:51 server1 sshd\[28140\]: Invalid user nimda from 116.85.42.175 Jul 13 22:42:51 server1 sshd\[28140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.42.175 ... |
2020-07-14 14:04:31 |
| 200.106.53.226 | attackbots | Jul 14 07:55:09 ift sshd\[42612\]: Invalid user git from 200.106.53.226Jul 14 07:55:11 ift sshd\[42612\]: Failed password for invalid user git from 200.106.53.226 port 43246 ssh2Jul 14 07:58:31 ift sshd\[43321\]: Invalid user ctm from 200.106.53.226Jul 14 07:58:33 ift sshd\[43321\]: Failed password for invalid user ctm from 200.106.53.226 port 37568 ssh2Jul 14 08:01:44 ift sshd\[44455\]: Invalid user pay from 200.106.53.226 ... |
2020-07-14 13:49:28 |
| 111.40.87.54 | attackbots | Port Scan ... |
2020-07-14 14:00:38 |
| 103.1.179.178 | attackspam | Jul 12 19:42:16 mail sshd[27448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.179.178 Jul 12 19:42:18 mail sshd[27448]: Failed password for invalid user sinus from 103.1.179.178 port 34348 ssh2 ... |
2020-07-14 13:48:11 |
| 103.1.179.91 | attackspambots | Jul 13 00:35:00 mail sshd[42772]: Failed password for mysql from 103.1.179.91 port 34790 ssh2 ... |
2020-07-14 13:43:33 |
| 222.186.180.223 | attack | Jul 13 20:08:48 web9 sshd\[3640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root Jul 13 20:08:50 web9 sshd\[3640\]: Failed password for root from 222.186.180.223 port 58736 ssh2 Jul 13 20:08:53 web9 sshd\[3640\]: Failed password for root from 222.186.180.223 port 58736 ssh2 Jul 13 20:08:56 web9 sshd\[3640\]: Failed password for root from 222.186.180.223 port 58736 ssh2 Jul 13 20:08:58 web9 sshd\[3640\]: Failed password for root from 222.186.180.223 port 58736 ssh2 |
2020-07-14 14:12:36 |
| 106.12.45.110 | attack | Jul 14 06:12:32 haigwepa sshd[31175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.45.110 Jul 14 06:12:34 haigwepa sshd[31175]: Failed password for invalid user jenkins from 106.12.45.110 port 37540 ssh2 ... |
2020-07-14 13:58:07 |
| 157.230.42.11 | attack | Jul 14 08:57:38 gw1 sshd[6155]: Failed password for root from 157.230.42.11 port 42044 ssh2 ... |
2020-07-14 13:47:32 |
| 218.92.0.251 | attack | 2020-07-14T02:01:21.713763uwu-server sshd[242435]: Failed password for root from 218.92.0.251 port 36937 ssh2 2020-07-14T02:01:26.583951uwu-server sshd[242435]: Failed password for root from 218.92.0.251 port 36937 ssh2 2020-07-14T02:01:30.800683uwu-server sshd[242435]: Failed password for root from 218.92.0.251 port 36937 ssh2 2020-07-14T02:01:34.285669uwu-server sshd[242435]: Failed password for root from 218.92.0.251 port 36937 ssh2 2020-07-14T02:01:39.829754uwu-server sshd[242435]: Failed password for root from 218.92.0.251 port 36937 ssh2 ... |
2020-07-14 14:21:36 |
| 218.92.0.215 | attackspam | Jul 14 10:40:24 gw1 sshd[8386]: Failed password for root from 218.92.0.215 port 41466 ssh2 ... |
2020-07-14 13:44:38 |