City: unknown
Region: unknown
Country: Ukraine
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.66.138.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.66.138.9. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032900 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 22:22:11 CST 2025
;; MSG SIZE rcvd: 105
Host 9.138.66.195.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 9.138.66.195.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
213.81.208.23 | attackbots | 213.81.208.23 - - \[13/May/2020:14:33:14 +0200\] "POST /wp-login.php HTTP/1.0" 200 2797 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 213.81.208.23 - - \[13/May/2020:14:33:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 2796 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 213.81.208.23 - - \[13/May/2020:14:33:30 +0200\] "POST /wp-login.php HTTP/1.0" 200 2771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-05-14 02:29:16 |
94.191.70.187 | attackspambots | IP blocked |
2020-05-14 02:13:16 |
81.42.204.189 | attackspam | Invalid user free from 81.42.204.189 port 24591 |
2020-05-14 02:21:14 |
185.204.118.116 | attackbots | May 13 14:27:39 ns382633 sshd\[5456\]: Invalid user thomas from 185.204.118.116 port 50970 May 13 14:27:39 ns382633 sshd\[5456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.204.118.116 May 13 14:27:41 ns382633 sshd\[5456\]: Failed password for invalid user thomas from 185.204.118.116 port 50970 ssh2 May 13 14:34:05 ns382633 sshd\[12991\]: Invalid user fii from 185.204.118.116 port 60786 May 13 14:34:05 ns382633 sshd\[12991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.204.118.116 |
2020-05-14 02:05:19 |
194.126.183.171 | attack | May 13 14:12:45 mail.srvfarm.net postfix/smtpd[540848]: NOQUEUE: reject: RCPT from unknown[194.126.183.171]: 554 5.7.1 Service unavailable; Client host [194.126.183.171] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?194.126.183.171; from= |
2020-05-14 02:40:44 |
122.225.230.10 | attack | May 13 19:48:47 vpn01 sshd[31128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.225.230.10 May 13 19:48:49 vpn01 sshd[31128]: Failed password for invalid user open from 122.225.230.10 port 53562 ssh2 ... |
2020-05-14 02:07:43 |
191.53.249.110 | attackspambots | May 13 14:25:49 mail.srvfarm.net postfix/smtpd[541150]: warning: unknown[191.53.249.110]: SASL PLAIN authentication failed: May 13 14:25:49 mail.srvfarm.net postfix/smtpd[541150]: lost connection after AUTH from unknown[191.53.249.110] May 13 14:29:14 mail.srvfarm.net postfix/smtpd[553606]: warning: unknown[191.53.249.110]: SASL PLAIN authentication failed: May 13 14:29:14 mail.srvfarm.net postfix/smtpd[553606]: lost connection after AUTH from unknown[191.53.249.110] May 13 14:30:04 mail.srvfarm.net postfix/smtps/smtpd[553710]: warning: unknown[191.53.249.110]: SASL PLAIN authentication failed: |
2020-05-14 02:41:19 |
185.234.217.191 | attackspam | May 13 15:43:15 web01.agentur-b-2.de postfix/smtpd[228384]: warning: unknown[185.234.217.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 15:43:15 web01.agentur-b-2.de postfix/smtpd[228384]: lost connection after AUTH from unknown[185.234.217.191] May 13 15:45:20 web01.agentur-b-2.de postfix/smtpd[224706]: warning: unknown[185.234.217.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 15:45:20 web01.agentur-b-2.de postfix/smtpd[224706]: lost connection after AUTH from unknown[185.234.217.191] May 13 15:48:25 web01.agentur-b-2.de postfix/smtpd[228715]: warning: unknown[185.234.217.191]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-05-14 02:44:16 |
171.61.88.249 | attackbotsspam | May 13 19:08:35 mout sshd[12713]: Invalid user oracle1 from 171.61.88.249 port 58834 |
2020-05-14 02:10:08 |
91.132.103.86 | attack | SSH Brute-Force Attack |
2020-05-14 02:14:35 |
5.187.0.216 | attackbotsspam | May 13 20:11:18 buvik sshd[24897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.187.0.216 May 13 20:11:20 buvik sshd[24897]: Failed password for invalid user hadoop from 5.187.0.216 port 36074 ssh2 May 13 20:15:25 buvik sshd[25499]: Invalid user postgres from 5.187.0.216 ... |
2020-05-14 02:27:24 |
187.49.133.220 | attackspam | 2020-05-13 05:22:38 server sshd[60300]: Failed password for invalid user root from 187.49.133.220 port 33575 ssh2 |
2020-05-14 02:31:18 |
167.99.120.33 | attackbotsspam | 167.99.120.33 - - [13/May/2020:14:33:31 +0200] "POST /wp-login.php HTTP/1.1" 200 3406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.99.120.33 - - [13/May/2020:14:33:38 +0200] "POST /wp-login.php HTTP/1.1" 200 3406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-05-14 02:24:10 |
218.92.0.165 | attackbotsspam | May 13 20:01:54 ns381471 sshd[17407]: Failed password for root from 218.92.0.165 port 1346 ssh2 May 13 20:02:07 ns381471 sshd[17407]: error: maximum authentication attempts exceeded for root from 218.92.0.165 port 1346 ssh2 [preauth] |
2020-05-14 02:18:24 |
117.103.2.114 | attackspambots | May 13 16:45:16 vmd48417 sshd[21276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.114 |
2020-05-14 02:12:35 |