City: Munich
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.19.190.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.19.190.8. IN A
;; AUTHORITY SECTION:
. 353 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023100500 1800 900 604800 86400
;; Query time: 207 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 06 00:14:16 CST 2023
;; MSG SIZE rcvd: 103
8.190.19.2.in-addr.arpa domain name pointer a2-19-190-8.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
8.190.19.2.in-addr.arpa name = a2-19-190-8.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 77.247.108.49 | attackspam | (PERMBLOCK) 77.247.108.49 (NL/Netherlands/-) has had more than 4 temp blocks in the last 86400 secs |
2019-09-22 13:47:18 |
| 91.134.140.242 | attack | Sep 21 18:23:24 hpm sshd\[9840\]: Invalid user testing from 91.134.140.242 Sep 21 18:23:24 hpm sshd\[9840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=242.ip-91-134-140.eu Sep 21 18:23:26 hpm sshd\[9840\]: Failed password for invalid user testing from 91.134.140.242 port 44410 ssh2 Sep 21 18:27:31 hpm sshd\[10180\]: Invalid user oracle from 91.134.140.242 Sep 21 18:27:31 hpm sshd\[10180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=242.ip-91-134-140.eu |
2019-09-22 13:42:18 |
| 46.101.39.199 | attackspambots | Sep 21 18:07:54 auw2 sshd\[20682\]: Invalid user istian from 46.101.39.199 Sep 21 18:07:54 auw2 sshd\[20682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.39.199 Sep 21 18:07:57 auw2 sshd\[20682\]: Failed password for invalid user istian from 46.101.39.199 port 48168 ssh2 Sep 21 18:12:01 auw2 sshd\[21196\]: Invalid user orangedev from 46.101.39.199 Sep 21 18:12:01 auw2 sshd\[21196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.39.199 |
2019-09-22 13:26:59 |
| 54.39.99.184 | attackspam | 2019-09-22T00:47:02.3073211495-001 sshd\[53234\]: Failed password for invalid user insanos from 54.39.99.184 port 9606 ssh2 2019-09-22T00:58:37.4506111495-001 sshd\[54251\]: Invalid user template from 54.39.99.184 port 7086 2019-09-22T00:58:37.4537051495-001 sshd\[54251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=apps.gendapro.com 2019-09-22T00:58:39.3864281495-001 sshd\[54251\]: Failed password for invalid user template from 54.39.99.184 port 7086 ssh2 2019-09-22T01:02:36.4727211495-001 sshd\[54617\]: Invalid user backend from 54.39.99.184 port 48592 2019-09-22T01:02:36.4763361495-001 sshd\[54617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=apps.gendapro.com ... |
2019-09-22 13:25:34 |
| 46.101.142.99 | attackspambots | Sep 22 05:01:21 localhost sshd\[130290\]: Invalid user indigo from 46.101.142.99 port 43602 Sep 22 05:01:21 localhost sshd\[130290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.142.99 Sep 22 05:01:23 localhost sshd\[130290\]: Failed password for invalid user indigo from 46.101.142.99 port 43602 ssh2 Sep 22 05:06:29 localhost sshd\[130430\]: Invalid user alex from 46.101.142.99 port 38900 Sep 22 05:06:29 localhost sshd\[130430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.142.99 ... |
2019-09-22 13:07:03 |
| 95.141.141.190 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 04:55:26. |
2019-09-22 13:49:33 |
| 59.125.120.118 | attack | Sep 21 19:01:40 auw2 sshd\[27256\]: Invalid user often from 59.125.120.118 Sep 21 19:01:40 auw2 sshd\[27256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-125-120-118.hinet-ip.hinet.net Sep 21 19:01:42 auw2 sshd\[27256\]: Failed password for invalid user often from 59.125.120.118 port 59815 ssh2 Sep 21 19:06:20 auw2 sshd\[27843\]: Invalid user skan from 59.125.120.118 Sep 21 19:06:20 auw2 sshd\[27843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-125-120-118.hinet-ip.hinet.net |
2019-09-22 13:19:19 |
| 137.74.47.22 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-22 13:54:04 |
| 51.15.87.74 | attack | Sep 22 05:00:36 hcbbdb sshd\[22616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.74 user=root Sep 22 05:00:37 hcbbdb sshd\[22616\]: Failed password for root from 51.15.87.74 port 40428 ssh2 Sep 22 05:05:00 hcbbdb sshd\[23129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.74 user=mail Sep 22 05:05:02 hcbbdb sshd\[23129\]: Failed password for mail from 51.15.87.74 port 53468 ssh2 Sep 22 05:09:21 hcbbdb sshd\[23623\]: Invalid user wp-user from 51.15.87.74 |
2019-09-22 13:18:02 |
| 93.39.200.50 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/93.39.200.50/ IT - 1H : (64) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : IT NAME ASN : ASN12874 IP : 93.39.200.50 CIDR : 93.36.0.0/14 PREFIX COUNT : 94 UNIQUE IP COUNT : 3612160 WYKRYTE ATAKI Z ASN12874 : 1H - 1 3H - 1 6H - 2 12H - 2 24H - 8 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN - data recovery |
2019-09-22 13:06:31 |
| 177.157.191.25 | attackspambots | Automatic report - Port Scan Attack |
2019-09-22 13:45:18 |
| 138.197.221.114 | attackspambots | Invalid user fedor from 138.197.221.114 port 55566 |
2019-09-22 13:21:15 |
| 178.128.86.127 | attack | Invalid user rr from 178.128.86.127 port 49950 |
2019-09-22 13:14:05 |
| 213.128.67.212 | attackbots | Sep 22 04:45:08 hcbbdb sshd\[20749\]: Invalid user ftp1 from 213.128.67.212 Sep 22 04:45:08 hcbbdb sshd\[20749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.128.67.212 Sep 22 04:45:10 hcbbdb sshd\[20749\]: Failed password for invalid user ftp1 from 213.128.67.212 port 40824 ssh2 Sep 22 04:49:41 hcbbdb sshd\[21283\]: Invalid user freund from 213.128.67.212 Sep 22 04:49:41 hcbbdb sshd\[21283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.128.67.212 |
2019-09-22 13:05:03 |
| 122.199.225.53 | attack | 2019-09-22T05:00:25.525314abusebot-6.cloudsearch.cf sshd\[23609\]: Invalid user admin from 122.199.225.53 port 39804 |
2019-09-22 13:13:08 |