City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.124.13.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.124.13.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 13:49:51 CST 2025
;; MSG SIZE rcvd: 106
b'Host 92.13.124.192.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 92.13.124.192.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 77.232.106.221 | attack | firewall-block, port(s): 2323/tcp |
2019-07-15 21:38:21 |
| 139.59.94.192 | attackspambots | Automatic report - Banned IP Access |
2019-07-15 22:12:09 |
| 167.99.3.40 | attackspam | Jul 15 14:47:02 v22019058497090703 sshd[17222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.3.40 Jul 15 14:47:05 v22019058497090703 sshd[17222]: Failed password for invalid user dasusr1 from 167.99.3.40 port 51559 ssh2 Jul 15 14:51:32 v22019058497090703 sshd[17502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.3.40 ... |
2019-07-15 21:52:51 |
| 60.2.201.80 | attackspam | Jul 15 09:31:43 MK-Soft-VM3 sshd\[5563\]: Invalid user cacti from 60.2.201.80 port 16240 Jul 15 09:31:43 MK-Soft-VM3 sshd\[5563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.2.201.80 Jul 15 09:31:45 MK-Soft-VM3 sshd\[5563\]: Failed password for invalid user cacti from 60.2.201.80 port 16240 ssh2 ... |
2019-07-15 21:32:43 |
| 138.68.94.173 | attack | Multiple SSH auth failures recorded by fail2ban |
2019-07-15 21:50:55 |
| 203.122.21.26 | attackspam | Jul 15 11:24:44 server01 sshd\[2576\]: Invalid user es from 203.122.21.26 Jul 15 11:24:44 server01 sshd\[2576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.122.21.26 Jul 15 11:24:46 server01 sshd\[2576\]: Failed password for invalid user es from 203.122.21.26 port 48042 ssh2 ... |
2019-07-15 21:15:11 |
| 134.249.138.36 | attackspam | Jul 10 21:46:55 [snip] sshd[27817]: Invalid user oracle2 from 134.249.138.36 port 50348 Jul 10 21:46:55 [snip] sshd[27817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.249.138.36 Jul 10 21:46:57 [snip] sshd[27817]: Failed password for invalid user oracle2 from 134.249.138.36 port 50348 ssh2[...] |
2019-07-15 21:13:43 |
| 207.46.13.145 | attackspambots | Automatic report - Banned IP Access |
2019-07-15 21:43:59 |
| 191.102.91.210 | attackbotsspam | Looking for resource vulnerabilities |
2019-07-15 21:41:17 |
| 79.107.179.124 | attackspam | Automatic report - Port Scan Attack |
2019-07-15 22:15:01 |
| 36.71.29.125 | attack | firewall-block, port(s): 8080/tcp |
2019-07-15 21:40:44 |
| 185.97.113.132 | attack | Jul 15 09:23:20 microserver sshd[41124]: Invalid user ts3 from 185.97.113.132 port 30663 Jul 15 09:23:20 microserver sshd[41124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.113.132 Jul 15 09:23:22 microserver sshd[41124]: Failed password for invalid user ts3 from 185.97.113.132 port 30663 ssh2 Jul 15 09:28:55 microserver sshd[41852]: Invalid user lw from 185.97.113.132 port 42884 Jul 15 09:28:55 microserver sshd[41852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.113.132 Jul 15 09:40:06 microserver sshd[43591]: Invalid user test from 185.97.113.132 port 22771 Jul 15 09:40:06 microserver sshd[43591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.113.132 Jul 15 09:40:08 microserver sshd[43591]: Failed password for invalid user test from 185.97.113.132 port 22771 ssh2 Jul 15 09:45:46 microserver sshd[44396]: Invalid user oracleadmin from 185.97.113.132 port 15760 |
2019-07-15 22:00:09 |
| 91.81.31.118 | attack | Jul 15 17:29:43 itv-usvr-01 sshd[16104]: Invalid user natalie from 91.81.31.118 Jul 15 17:29:43 itv-usvr-01 sshd[16104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.81.31.118 Jul 15 17:29:43 itv-usvr-01 sshd[16104]: Invalid user natalie from 91.81.31.118 Jul 15 17:29:45 itv-usvr-01 sshd[16104]: Failed password for invalid user natalie from 91.81.31.118 port 39188 ssh2 Jul 15 17:38:50 itv-usvr-01 sshd[16506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.81.31.118 user=ubuntu Jul 15 17:38:52 itv-usvr-01 sshd[16506]: Failed password for ubuntu from 91.81.31.118 port 32902 ssh2 |
2019-07-15 22:01:09 |
| 180.156.221.120 | attackspam | Jul 14 23:23:53 vtv3 sshd\[14277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.156.221.120 user=root Jul 14 23:23:55 vtv3 sshd\[14277\]: Failed password for root from 180.156.221.120 port 47745 ssh2 Jul 14 23:27:44 vtv3 sshd\[16190\]: Invalid user ubuntu from 180.156.221.120 port 39594 Jul 14 23:27:44 vtv3 sshd\[16190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.156.221.120 Jul 14 23:27:46 vtv3 sshd\[16190\]: Failed password for invalid user ubuntu from 180.156.221.120 port 39594 ssh2 Jul 14 23:39:12 vtv3 sshd\[21711\]: Invalid user vps from 180.156.221.120 port 43426 Jul 14 23:39:12 vtv3 sshd\[21711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.156.221.120 Jul 14 23:39:14 vtv3 sshd\[21711\]: Failed password for invalid user vps from 180.156.221.120 port 43426 ssh2 Jul 14 23:43:03 vtv3 sshd\[23670\]: Invalid user jason from 180.156.221.120 port 35280 Jul |
2019-07-15 22:10:40 |
| 113.196.35.20 | attackspambots | Lines containing failures of 113.196.35.20 Jul 15 08:17:54 MAKserver06 sshd[2149]: Invalid user pentaho from 113.196.35.20 port 31312 Jul 15 08:17:54 MAKserver06 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.196.35.20 Jul 15 08:17:56 MAKserver06 sshd[2149]: Failed password for invalid user pentaho from 113.196.35.20 port 31312 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.196.35.20 |
2019-07-15 21:13:14 |