City: Erkrath
Region: North Rhine-Westphalia
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.213.252.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5446
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.213.252.159. IN A
;; AUTHORITY SECTION:
. 248 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400
;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 12:23:46 CST 2019
;; MSG SIZE rcvd: 117
Host 159.252.213.2.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 159.252.213.2.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.250.154.240 | attackspambots | Oct 1 13:38:51 smtp sshd[20539]: Failed password for r.r from 119.250.154.240 port 26678 ssh2 Oct 1 13:49:43 smtp sshd[22181]: Invalid user sumhostname from 119.250.154.240 Oct 1 13:49:46 smtp sshd[22181]: Failed password for invalid user sumhostname from 119.250.154.240 port 52774 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=119.250.154.240 |
2020-10-01 21:22:43 |
| 157.230.59.44 | attack | 2020-10-01 14:40:45,134 fail2ban.actions: WARNING [ssh] Ban 157.230.59.44 |
2020-10-01 21:28:15 |
| 138.68.150.93 | attackbotsspam | 138.68.150.93 - - [01/Oct/2020:12:48:02 +0100] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.68.150.93 - - [01/Oct/2020:12:48:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.68.150.93 - - [01/Oct/2020:12:48:04 +0100] "POST /wp-login.php HTTP/1.1" 200 2204 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-01 21:19:24 |
| 178.254.171.84 | attackbots | Invalid user admin from 178.254.171.84 port 49435 |
2020-10-01 21:36:54 |
| 192.241.208.139 | attackspambots | Unauthorized connection attempt, Score = 100 , Banned for 15 Days |
2020-10-01 21:20:15 |
| 64.213.148.44 | attack | Oct 1 11:10:58 h2829583 sshd[15638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44 |
2020-10-01 21:55:16 |
| 62.234.17.74 | attack | $f2bV_matches |
2020-10-01 21:38:45 |
| 161.35.46.40 | attack | Oct 1 03:43:53 itv-usvr-01 sshd[16788]: Invalid user admin from 161.35.46.40 Oct 1 03:43:53 itv-usvr-01 sshd[16788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.46.40 Oct 1 03:43:53 itv-usvr-01 sshd[16788]: Invalid user admin from 161.35.46.40 Oct 1 03:43:56 itv-usvr-01 sshd[16788]: Failed password for invalid user admin from 161.35.46.40 port 52334 ssh2 Oct 1 03:48:14 itv-usvr-01 sshd[16982]: Invalid user erp from 161.35.46.40 |
2020-10-01 21:15:39 |
| 139.155.226.188 | attackbots | Oct 1 15:37:49 server sshd[22762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.226.188 Oct 1 15:37:51 server sshd[22762]: Failed password for invalid user mmx from 139.155.226.188 port 36540 ssh2 Oct 1 15:51:11 server sshd[23652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.226.188 user=root Oct 1 15:51:13 server sshd[23652]: Failed password for invalid user root from 139.155.226.188 port 41544 ssh2 |
2020-10-01 21:51:50 |
| 162.142.125.74 | attackbots | firewall-block, port(s): 9474/tcp |
2020-10-01 21:51:21 |
| 94.25.170.49 | attackbots | 1601498461 - 09/30/2020 22:41:01 Host: 94.25.170.49/94.25.170.49 Port: 445 TCP Blocked |
2020-10-01 21:16:10 |
| 102.37.40.61 | attack | Invalid user updater from 102.37.40.61 port 51906 |
2020-10-01 21:36:19 |
| 103.44.253.18 | attack | Invalid user oracle from 103.44.253.18 port 51010 |
2020-10-01 21:45:23 |
| 116.125.141.56 | attack | Oct 1 16:14:40 dignus sshd[27273]: Failed password for invalid user transmission from 116.125.141.56 port 46524 ssh2 Oct 1 16:16:36 dignus sshd[27460]: Invalid user gera from 116.125.141.56 port 45500 Oct 1 16:16:36 dignus sshd[27460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.125.141.56 Oct 1 16:16:38 dignus sshd[27460]: Failed password for invalid user gera from 116.125.141.56 port 45500 ssh2 Oct 1 16:18:36 dignus sshd[27672]: Invalid user claudia from 116.125.141.56 port 44564 ... |
2020-10-01 21:26:30 |
| 192.241.217.161 | attackbotsspam | Invalid user tester1 from 192.241.217.161 port 54302 |
2020-10-01 21:29:09 |