City: unknown
Region: unknown
Country: Uruguay
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.64.90.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;190.64.90.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:05:43 CST 2025
;; MSG SIZE rcvd: 105
80.90.64.190.in-addr.arpa domain name pointer r190-64-90-80.su-static.adinet.com.uy.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.90.64.190.in-addr.arpa name = r190-64-90-80.su-static.adinet.com.uy.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.176.27.102 | attackspambots |
|
2020-08-16 17:02:11 |
| 63.83.76.20 | attackbotsspam | Aug 12 06:48:12 online-web-1 postfix/smtpd[1007576]: connect from juice.bicharter.com[63.83.76.20] Aug x@x Aug 12 06:48:17 online-web-1 postfix/smtpd[1007576]: disconnect from juice.bicharter.com[63.83.76.20] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Aug 12 06:48:31 online-web-1 postfix/smtpd[1007575]: connect from juice.bicharter.com[63.83.76.20] Aug x@x Aug 12 06:48:37 online-web-1 postfix/smtpd[1007575]: disconnect from juice.bicharter.com[63.83.76.20] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Aug 12 06:51:55 online-web-1 postfix/smtpd[1007575]: connect from juice.bicharter.com[63.83.76.20] Aug x@x Aug 12 06:52:01 online-web-1 postfix/smtpd[1007575]: disconnect from juice.bicharter.com[63.83.76.20] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Aug 12 06:55:04 online-web-1 postfix/smtpd[1007575]: connect from juice.bicharter.com[63.83.76.20] Aug 12 06:55:05 online-web-1 postfix/smtpd[1007576]: connect from juice.bicharter.co........ ------------------------------- |
2020-08-16 17:09:08 |
| 175.207.13.22 | attackbotsspam | Aug 16 07:39:03 db sshd[31086]: User root from 175.207.13.22 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-16 17:01:30 |
| 110.49.70.248 | attackspambots | Aug 16 05:32:48 ovpn sshd\[28822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.248 user=root Aug 16 05:32:50 ovpn sshd\[28822\]: Failed password for root from 110.49.70.248 port 44474 ssh2 Aug 16 05:37:14 ovpn sshd\[29876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.248 user=root Aug 16 05:37:16 ovpn sshd\[29876\]: Failed password for root from 110.49.70.248 port 4253 ssh2 Aug 16 05:50:38 ovpn sshd\[707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.248 user=root |
2020-08-16 17:06:04 |
| 5.62.20.30 | attackbotsspam | (From mash.waylon@gmail.com) Good morning, I was just checking out your website and submitted this message via your feedback form. The "contact us" page on your site sends you messages like this to your email account which is why you're reading through my message right now right? That's half the battle with any kind of advertising, getting people to actually READ your advertisement and this is exactly what you're doing now! If you have an advertisement you would like to promote to tons of websites via their contact forms in the U.S. or anywhere in the world send me a quick note now, I can even target particular niches and my charges are very low. Send a message to: denzeljax219@gmail.com remove my website from your list https://bit.ly/3eOGPEY |
2020-08-16 17:12:58 |
| 51.195.47.153 | attackspambots | SSH_bulk_scanner |
2020-08-16 17:01:06 |
| 81.68.76.254 | attackspambots | Aug 15 12:17:13 serwer sshd\[20041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.76.254 user=root Aug 15 12:17:15 serwer sshd\[20041\]: Failed password for root from 81.68.76.254 port 38414 ssh2 Aug 15 12:23:15 serwer sshd\[23729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.76.254 user=root ... |
2020-08-16 16:42:35 |
| 141.98.10.195 | attackspam | Aug 16 08:12:38 scw-6657dc sshd[4714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.195 Aug 16 08:12:38 scw-6657dc sshd[4714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.195 Aug 16 08:12:40 scw-6657dc sshd[4714]: Failed password for invalid user 1234 from 141.98.10.195 port 40920 ssh2 ... |
2020-08-16 17:04:25 |
| 106.12.38.231 | attack | Failed password for invalid user hn123456 from 106.12.38.231 port 59824 ssh2 |
2020-08-16 16:56:26 |
| 139.59.70.186 | attackbotsspam | srv02 Mass scanning activity detected Target: 4592 .. |
2020-08-16 17:18:06 |
| 212.47.237.75 | attackbots | Tried sshing with brute force. |
2020-08-16 17:10:43 |
| 142.93.215.19 | attack | Aug 15 12:36:59 serwer sshd\[32204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.215.19 user=root Aug 15 12:37:00 serwer sshd\[32204\]: Failed password for root from 142.93.215.19 port 37680 ssh2 Aug 15 12:43:50 serwer sshd\[4056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.215.19 user=root ... |
2020-08-16 17:00:25 |
| 192.169.218.28 | attackbots | WordPress (CMS) attack attempts. Date: 2020 Aug 16. 01:53:06 Source IP: 192.169.218.28 Portion of the log(s): 192.169.218.28 - [16/Aug/2020:01:53:00 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.169.218.28 - [16/Aug/2020:01:53:01 +0200] "POST /wp-login.php HTTP/1.1" 200 2411 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.169.218.28 - [16/Aug/2020:01:53:02 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.169.218.28 - [16/Aug/2020:01:53:03 +0200] "POST /wp-login.php HTTP/1.1" 200 2414 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.169.218.28 - [16/Aug/2020:01:53:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1962 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.169.218.28 - [16/Aug/2020:01:53:05 +0200] "POST /wp-login.php |
2020-08-16 16:43:13 |
| 141.98.10.198 | attack | Aug 16 08:12:15 scw-6657dc sshd[4672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.198 Aug 16 08:12:15 scw-6657dc sshd[4672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.198 Aug 16 08:12:17 scw-6657dc sshd[4672]: Failed password for invalid user Administrator from 141.98.10.198 port 43227 ssh2 ... |
2020-08-16 17:17:19 |
| 139.186.69.92 | attackspam | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-08-16 16:38:59 |