City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.4.14.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.4.14.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 05:23:46 CST 2025
;; MSG SIZE rcvd: 105
Host 242.14.4.195.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.14.4.195.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 80.211.137.127 | attackbots | $f2bV_matches |
2019-12-18 07:07:22 |
| 119.123.221.128 | attackspambots | 1576621577 - 12/17/2019 23:26:17 Host: 119.123.221.128/119.123.221.128 Port: 445 TCP Blocked |
2019-12-18 07:24:26 |
| 34.92.38.238 | attackbotsspam | Dec 17 23:26:46 ns41 sshd[6361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.38.238 |
2019-12-18 06:53:38 |
| 148.251.125.12 | attack | Automatic report - Banned IP Access |
2019-12-18 07:24:56 |
| 157.230.248.89 | attack | xmlrpc attack |
2019-12-18 08:02:36 |
| 130.83.161.131 | attackspam | Lines containing failures of 130.83.161.131 Dec 16 06:44:52 shared02 sshd[8767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.83.161.131 user=nobody Dec 16 06:44:54 shared02 sshd[8767]: Failed password for nobody from 130.83.161.131 port 38288 ssh2 Dec 16 06:44:54 shared02 sshd[8767]: Received disconnect from 130.83.161.131 port 38288:11: Bye Bye [preauth] Dec 16 06:44:54 shared02 sshd[8767]: Disconnected from authenticating user nobody 130.83.161.131 port 38288 [preauth] Dec 16 07:11:10 shared02 sshd[18447]: Invalid user anne-marie from 130.83.161.131 port 56106 Dec 16 07:11:10 shared02 sshd[18447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.83.161.131 Dec 16 07:11:12 shared02 sshd[18447]: Failed password for invalid user anne-marie from 130.83.161.131 port 56106 ssh2 Dec 16 07:11:12 shared02 sshd[18447]: Received disconnect from 130.83.161.131 port 56106:11: Bye Bye [preaut........ ------------------------------ |
2019-12-18 07:32:34 |
| 218.31.33.34 | attack | Invalid user gopalam from 218.31.33.34 port 48560 |
2019-12-18 07:07:42 |
| 24.50.216.104 | attackbotsspam | Dec 17 23:03:50 mxgate1 postfix/postscreen[13276]: CONNECT from [24.50.216.104]:46735 to [176.31.12.44]:25 Dec 17 23:03:50 mxgate1 postfix/dnsblog[13277]: addr 24.50.216.104 listed by domain cbl.abuseat.org as 127.0.0.2 Dec 17 23:03:50 mxgate1 postfix/dnsblog[13280]: addr 24.50.216.104 listed by domain zen.spamhaus.org as 127.0.0.11 Dec 17 23:03:50 mxgate1 postfix/dnsblog[13280]: addr 24.50.216.104 listed by domain zen.spamhaus.org as 127.0.0.3 Dec 17 23:03:50 mxgate1 postfix/dnsblog[13280]: addr 24.50.216.104 listed by domain zen.spamhaus.org as 127.0.0.4 Dec 17 23:03:50 mxgate1 postfix/dnsblog[13279]: addr 24.50.216.104 listed by domain b.barracudacentral.org as 127.0.0.2 Dec 17 23:03:56 mxgate1 postfix/postscreen[13276]: DNSBL rank 4 for [24.50.216.104]:46735 Dec x@x Dec 17 23:03:56 mxgate1 postfix/postscreen[13276]: HANGUP after 0.72 from [24.50.216.104]:46735 in tests after SMTP handshake Dec 17 23:03:56 mxgate1 postfix/postscreen[13276]: DISCONNECT [24.50.216.104]........ ------------------------------- |
2019-12-18 07:27:43 |
| 192.114.71.69 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-18 07:17:22 |
| 111.198.152.82 | attack | Dec 16 22:41:21 cumulus sshd[14961]: Invalid user godor from 111.198.152.82 port 49958 Dec 16 22:41:21 cumulus sshd[14961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.152.82 Dec 16 22:41:23 cumulus sshd[14961]: Failed password for invalid user godor from 111.198.152.82 port 49958 ssh2 Dec 16 22:41:23 cumulus sshd[14961]: Received disconnect from 111.198.152.82 port 49958:11: Bye Bye [preauth] Dec 16 22:41:23 cumulus sshd[14961]: Disconnected from 111.198.152.82 port 49958 [preauth] Dec 16 22:55:02 cumulus sshd[15791]: Invalid user apache from 111.198.152.82 port 44012 Dec 16 22:55:02 cumulus sshd[15791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.152.82 Dec 16 22:55:04 cumulus sshd[15791]: Failed password for invalid user apache from 111.198.152.82 port 44012 ssh2 Dec 16 22:55:04 cumulus sshd[15791]: Received disconnect from 111.198.152.82 port 44012:11: Bye Bye [pr........ ------------------------------- |
2019-12-18 06:58:24 |
| 125.161.136.26 | attackbots | Unauthorized connection attempt detected from IP address 125.161.136.26 to port 445 |
2019-12-18 07:15:58 |
| 192.99.36.177 | attackspam | 192.99.36.177 - - [18/Dec/2019:00:56:15 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:16 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:16 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:17 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 - - [18/Dec/2019:00:56:17 +0100] "POST /wp-login.php HTTP/1.1" 200 4578 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 192.99.36.177 |
2019-12-18 07:58:29 |
| 123.135.127.85 | attackspam | Dec 16 02:18:35 : SSH login attempts with invalid user |
2019-12-18 07:45:32 |
| 61.157.142.246 | attackbots | Dec 18 00:11:28 meumeu sshd[28071]: Failed password for root from 61.157.142.246 port 26019 ssh2 Dec 18 00:15:41 meumeu sshd[28754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.157.142.246 Dec 18 00:15:43 meumeu sshd[28754]: Failed password for invalid user xylina from 61.157.142.246 port 16972 ssh2 ... |
2019-12-18 07:21:11 |
| 222.186.173.238 | attack | Dec 17 23:57:35 root sshd[30673]: Failed password for root from 222.186.173.238 port 43796 ssh2 Dec 17 23:57:38 root sshd[30673]: Failed password for root from 222.186.173.238 port 43796 ssh2 Dec 17 23:57:41 root sshd[30673]: Failed password for root from 222.186.173.238 port 43796 ssh2 Dec 17 23:57:45 root sshd[30673]: Failed password for root from 222.186.173.238 port 43796 ssh2 ... |
2019-12-18 07:02:56 |