City: Kranj
Region: Kranj
Country: Slovenia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.249.237.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.249.237.21. IN A
;; AUTHORITY SECTION:
. 138 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022042901 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 30 05:06:47 CST 2022
;; MSG SIZE rcvd: 107
Host 21.237.249.194.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.237.249.194.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
1.52.46.118 | attack | Automatic report - Port Scan Attack |
2019-12-02 05:57:03 |
45.163.216.23 | attackspam | Dec 1 22:27:27 OPSO sshd\[28258\]: Invalid user ctrls from 45.163.216.23 port 51284 Dec 1 22:27:27 OPSO sshd\[28258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.216.23 Dec 1 22:27:28 OPSO sshd\[28258\]: Failed password for invalid user ctrls from 45.163.216.23 port 51284 ssh2 Dec 1 22:34:22 OPSO sshd\[30266\]: Invalid user 1234\$\#\$ from 45.163.216.23 port 36960 Dec 1 22:34:22 OPSO sshd\[30266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.216.23 |
2019-12-02 05:52:00 |
182.61.36.38 | attackbotsspam | Dec 1 22:28:29 vps666546 sshd\[9238\]: Invalid user viduya from 182.61.36.38 port 59786 Dec 1 22:28:29 vps666546 sshd\[9238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38 Dec 1 22:28:32 vps666546 sshd\[9238\]: Failed password for invalid user viduya from 182.61.36.38 port 59786 ssh2 Dec 1 22:34:28 vps666546 sshd\[9483\]: Invalid user myhrvold from 182.61.36.38 port 39810 Dec 1 22:34:28 vps666546 sshd\[9483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.36.38 ... |
2019-12-02 05:55:51 |
204.13.232.50 | attackspambots | WordPress XMLRPC scan :: 204.13.232.50 0.080 BYPASS [01/Dec/2019:14:34:58 0000] [censored_4] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-12-02 05:40:55 |
104.248.121.67 | attack | Dec 1 22:48:29 vps691689 sshd[18706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 Dec 1 22:48:30 vps691689 sshd[18706]: Failed password for invalid user loge from 104.248.121.67 port 33936 ssh2 ... |
2019-12-02 05:59:42 |
37.49.230.34 | attackspam | \[2019-12-01 14:25:00\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-01T14:25:00.414-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="40040048422069033",SessionID="0x7f26c4276ea8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.34/50891",ACLName="no_extension_match" \[2019-12-01 14:25:13\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-01T14:25:13.073-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="33410048422069026",SessionID="0x7f26c40cecf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.34/64731",ACLName="no_extension_match" \[2019-12-01 14:26:06\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-01T14:26:06.247-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="52470048422069032",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.34/60324",ACLName="no_ |
2019-12-02 06:03:00 |
171.250.141.33 | attackbots | Automatic report - Port Scan Attack |
2019-12-02 05:45:39 |
95.215.0.13 | attackspambots | [portscan] Port scan |
2019-12-02 06:00:49 |
203.160.62.115 | attack | Dec 1 20:28:06 cloud sshd[13049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.62.115 user=r.r Dec 1 20:28:08 cloud sshd[13049]: Failed password for r.r from 203.160.62.115 port 34296 ssh2 Dec 1 20:42:29 cloud sshd[16109]: Invalid user weblogic from 203.160.62.115 port 58384 Dec 1 20:42:29 cloud sshd[16109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.62.115 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=203.160.62.115 |
2019-12-02 05:54:28 |
212.129.52.3 | attackbots | Dec 1 22:01:55 ArkNodeAT sshd\[13173\]: Invalid user ruttger from 212.129.52.3 Dec 1 22:01:55 ArkNodeAT sshd\[13173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.52.3 Dec 1 22:01:57 ArkNodeAT sshd\[13173\]: Failed password for invalid user ruttger from 212.129.52.3 port 43153 ssh2 |
2019-12-02 05:44:56 |
188.166.117.213 | attackbots | Dec 1 21:25:50 root sshd[4305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 Dec 1 21:25:52 root sshd[4305]: Failed password for invalid user cmi from 188.166.117.213 port 52844 ssh2 Dec 1 21:28:43 root sshd[4395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 ... |
2019-12-02 05:40:02 |
222.87.0.79 | attack | Dec 1 17:40:21 MK-Soft-VM5 sshd[11336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.87.0.79 Dec 1 17:40:23 MK-Soft-VM5 sshd[11336]: Failed password for invalid user victor from 222.87.0.79 port 41399 ssh2 ... |
2019-12-02 06:02:17 |
158.69.247.59 | attack | \[2019-12-01 15:34:30\] SECURITY\[15511\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-01T15:34:30.820+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="2019",SessionID="0x7fcd8c88c058",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/158.69.247.59/5462",Challenge="7e2b585d",ReceivedChallenge="7e2b585d",ReceivedHash="067275781eab5228b89ebf283432c279" \[2019-12-01 15:34:31\] SECURITY\[15511\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-01T15:34:31.260+0100",Severity="Error",Service="SIP",EventVersion="2",AccountID="2019",SessionID="0x7fcd8c614578",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/158.69.247.59/5462",Challenge="46a3cd86",ReceivedChallenge="46a3cd86",ReceivedHash="dde28bacc83c881295397014f69891a0" \[2019-12-01 15:34:31\] SECURITY\[15511\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-01T15:34:31.310+0100",Severity="Error",Service="SIP",EventVersion="2",A ... |
2019-12-02 05:48:33 |
197.44.76.51 | attack | Unauthorised access (Dec 1) SRC=197.44.76.51 LEN=40 TTL=50 ID=58392 TCP DPT=8080 WINDOW=27485 SYN Unauthorised access (Dec 1) SRC=197.44.76.51 LEN=40 TTL=50 ID=61982 TCP DPT=8080 WINDOW=27485 SYN |
2019-12-02 06:15:39 |
94.21.243.204 | attack | Dec 1 21:43:27 web8 sshd\[16932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204 user=root Dec 1 21:43:28 web8 sshd\[16932\]: Failed password for root from 94.21.243.204 port 48619 ssh2 Dec 1 21:49:29 web8 sshd\[19746\]: Invalid user jeandell from 94.21.243.204 Dec 1 21:49:29 web8 sshd\[19746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204 Dec 1 21:49:31 web8 sshd\[19746\]: Failed password for invalid user jeandell from 94.21.243.204 port 55733 ssh2 |
2019-12-02 06:06:09 |