City: Riga
Region: Riga
Country: Latvia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.196.53.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.196.53.85. IN A
;; AUTHORITY SECTION:
. 273 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023090601 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 07 11:23:54 CST 2023
;; MSG SIZE rcvd: 106
Host 85.53.196.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 85.53.196.196.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.232.55.161 | attackbots | Sep 7 12:55:43 Host-KEWR-E sshd[227570]: User root from 49.232.55.161 not allowed because not listed in AllowUsers ... |
2020-09-08 20:09:22 |
| 114.40.98.40 | attack | Unauthorized connection attempt from IP address 114.40.98.40 on Port 445(SMB) |
2020-09-08 19:51:32 |
| 112.85.42.200 | attackbotsspam | 2020-09-08T15:06:33.336196lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2 2020-09-08T15:06:37.187148lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2 2020-09-08T15:06:42.178279lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2 2020-09-08T15:06:45.214738lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2 2020-09-08T15:06:48.924208lavrinenko.info sshd[8773]: Failed password for root from 112.85.42.200 port 19317 ssh2 ... |
2020-09-08 20:13:40 |
| 201.151.166.170 | attackbots | 20/9/7@12:55:36: FAIL: Alarm-Network address from=201.151.166.170 20/9/7@12:55:36: FAIL: Alarm-Network address from=201.151.166.170 ... |
2020-09-08 20:16:38 |
| 222.186.150.123 | attackbotsspam | Sep 8 11:26:13 Ubuntu-1404-trusty-64-minimal sshd\[972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.150.123 user=root Sep 8 11:26:14 Ubuntu-1404-trusty-64-minimal sshd\[972\]: Failed password for root from 222.186.150.123 port 56502 ssh2 Sep 8 11:34:00 Ubuntu-1404-trusty-64-minimal sshd\[15911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.150.123 user=root Sep 8 11:34:01 Ubuntu-1404-trusty-64-minimal sshd\[15911\]: Failed password for root from 222.186.150.123 port 49378 ssh2 Sep 8 11:38:17 Ubuntu-1404-trusty-64-minimal sshd\[18971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.150.123 user=root |
2020-09-08 20:18:46 |
| 45.142.120.78 | attackspam | Sep 8 14:09:43 vmanager6029 postfix/smtpd\[15800\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 8 14:10:22 vmanager6029 postfix/smtpd\[15800\]: warning: unknown\[45.142.120.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-08 20:13:13 |
| 122.165.194.191 | attackbotsspam | Jul 7 22:13:23 server sshd[9271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.194.191 Jul 7 22:13:25 server sshd[9271]: Failed password for invalid user guangyuan from 122.165.194.191 port 34778 ssh2 Jul 7 22:22:04 server sshd[9664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.194.191 Jul 7 22:22:05 server sshd[9664]: Failed password for invalid user sysadmin from 122.165.194.191 port 42278 ssh2 |
2020-09-08 19:50:54 |
| 46.49.41.131 | attackspambots | Sep 7 20:04:56 mxgate1 sshd[20358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.49.41.131 user=r.r Sep 7 20:04:58 mxgate1 sshd[20358]: Failed password for r.r from 46.49.41.131 port 37414 ssh2 Sep 7 20:04:58 mxgate1 sshd[20358]: Connection closed by 46.49.41.131 port 37414 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=46.49.41.131 |
2020-09-08 19:57:38 |
| 45.95.168.131 | attackbotsspam | Fail2Ban automatic report: SSH brute-force: |
2020-09-08 20:09:51 |
| 144.217.130.102 | attackspambots | 144.217.130.102 - - [08/Sep/2020:09:55:04 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 144.217.130.102 - - [08/Sep/2020:09:55:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 144.217.130.102 - - [08/Sep/2020:09:55:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2037 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-08 20:17:26 |
| 102.40.127.223 | attackspambots | Mirai and Reaper Exploitation Traffic , PTR: host-102.40.127.223.tedata.net. |
2020-09-08 19:59:39 |
| 176.31.31.185 | attackbots | Failed password for root from 176.31.31.185 port 45542 ssh2 Invalid user app-ohras from 176.31.31.185 port 47085 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.31.185 Invalid user app-ohras from 176.31.31.185 port 47085 Failed password for invalid user app-ohras from 176.31.31.185 port 47085 ssh2 |
2020-09-08 20:22:14 |
| 125.161.136.235 | attackspambots | Unauthorized connection attempt from IP address 125.161.136.235 on Port 445(SMB) |
2020-09-08 19:49:11 |
| 203.205.33.9 | attack | Unauthorized connection attempt from IP address 203.205.33.9 on Port 445(SMB) |
2020-09-08 19:53:32 |
| 87.246.7.148 | attack | Brute forcing email accounts |
2020-09-08 20:15:03 |