City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 2.42.212.159 | attack | Repeated RDP login failures. Last user: administrator |
2020-06-11 23:27:58 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.42.212.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.42.212.65. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:01:30 CST 2025
;; MSG SIZE rcvd: 104
65.212.42.2.in-addr.arpa domain name pointer net-2-42-212-65.cust.vodafonedsl.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
65.212.42.2.in-addr.arpa name = net-2-42-212-65.cust.vodafonedsl.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.116.255.216 | attack | Aug 26 14:56:44 eddieflores sshd\[7900\]: Invalid user school from 42.116.255.216 Aug 26 14:56:44 eddieflores sshd\[7900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216 Aug 26 14:56:46 eddieflores sshd\[7900\]: Failed password for invalid user school from 42.116.255.216 port 49191 ssh2 Aug 26 15:05:59 eddieflores sshd\[8803\]: Invalid user guitar from 42.116.255.216 Aug 26 15:05:59 eddieflores sshd\[8803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216 |
2019-08-27 09:48:55 |
| 23.129.64.189 | attackspam | Aug 27 01:15:19 MK-Soft-VM3 sshd\[1128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.189 user=sshd Aug 27 01:15:21 MK-Soft-VM3 sshd\[1128\]: Failed password for sshd from 23.129.64.189 port 58698 ssh2 Aug 27 01:15:24 MK-Soft-VM3 sshd\[1128\]: Failed password for sshd from 23.129.64.189 port 58698 ssh2 ... |
2019-08-27 09:34:49 |
| 165.22.204.38 | attack | SSH Brute-Force reported by Fail2Ban |
2019-08-27 10:04:49 |
| 142.93.198.86 | attack | 2019-08-21T20:51:56.615687wiz-ks3 sshd[21192]: Invalid user smmsp from 142.93.198.86 port 52896 2019-08-21T20:51:56.617680wiz-ks3 sshd[21192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86 2019-08-21T20:51:56.615687wiz-ks3 sshd[21192]: Invalid user smmsp from 142.93.198.86 port 52896 2019-08-21T20:51:58.655854wiz-ks3 sshd[21192]: Failed password for invalid user smmsp from 142.93.198.86 port 52896 ssh2 2019-08-21T20:56:27.924131wiz-ks3 sshd[21203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86 user=root 2019-08-21T20:56:29.830900wiz-ks3 sshd[21203]: Failed password for root from 142.93.198.86 port 39968 ssh2 2019-08-21T21:01:20.613870wiz-ks3 sshd[21233]: Invalid user temp1 from 142.93.198.86 port 55254 2019-08-21T21:01:20.615887wiz-ks3 sshd[21233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86 2019-08-21T21:01:20.613870wiz-ks3 sshd[21233]: Inv |
2019-08-27 10:07:01 |
| 14.161.16.62 | attack | Aug 27 01:44:12 MK-Soft-VM7 sshd\[3433\]: Invalid user helena from 14.161.16.62 port 49070 Aug 27 01:44:12 MK-Soft-VM7 sshd\[3433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62 Aug 27 01:44:14 MK-Soft-VM7 sshd\[3433\]: Failed password for invalid user helena from 14.161.16.62 port 49070 ssh2 ... |
2019-08-27 10:15:32 |
| 180.183.247.237 | attackbotsspam | /wp-login.php |
2019-08-27 10:20:01 |
| 216.211.245.95 | attack | SSH Brute Force, server-1 sshd[10797]: Failed password for invalid user gspanos from 216.211.245.95 port 57146 ssh2 |
2019-08-27 10:17:23 |
| 172.104.242.173 | attackbotsspam | firewall-block, port(s): 110/tcp |
2019-08-27 10:18:46 |
| 171.25.193.20 | attackspambots | Aug 27 03:46:25 MK-Soft-Root1 sshd\[23276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20 user=sshd Aug 27 03:46:27 MK-Soft-Root1 sshd\[23276\]: Failed password for sshd from 171.25.193.20 port 39656 ssh2 Aug 27 03:46:27 MK-Soft-Root1 sshd\[23276\]: Failed password for sshd from 171.25.193.20 port 39656 ssh2 ... |
2019-08-27 09:53:44 |
| 196.52.43.54 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-08-27 10:12:34 |
| 157.230.110.11 | attackbotsspam | frenzy |
2019-08-27 10:08:56 |
| 92.119.160.103 | attackbots | 08/26/2019-21:44:36.349633 92.119.160.103 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-08-27 09:52:07 |
| 193.9.115.24 | attack | 2019-08-12T15:27:22.396347wiz-ks3 sshd[30174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.9.115.24 user=root 2019-08-12T15:27:24.722974wiz-ks3 sshd[30174]: Failed password for root from 193.9.115.24 port 32894 ssh2 2019-08-12T15:27:30.603257wiz-ks3 sshd[30174]: Failed password for root from 193.9.115.24 port 32894 ssh2 2019-08-12T15:27:22.396347wiz-ks3 sshd[30174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.9.115.24 user=root 2019-08-12T15:27:24.722974wiz-ks3 sshd[30174]: Failed password for root from 193.9.115.24 port 32894 ssh2 2019-08-12T15:27:30.603257wiz-ks3 sshd[30174]: Failed password for root from 193.9.115.24 port 32894 ssh2 2019-08-12T15:27:22.396347wiz-ks3 sshd[30174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.9.115.24 user=root 2019-08-12T15:27:24.722974wiz-ks3 sshd[30174]: Failed password for root from 193.9.115.24 port 32894 ssh2 2019-08-12T15:27: |
2019-08-27 09:49:12 |
| 137.74.158.143 | attackspam | WordPress wp-login brute force :: 137.74.158.143 0.044 BYPASS [27/Aug/2019:09:40:55 1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4479 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-27 09:46:03 |
| 178.128.158.113 | attack | Aug 27 02:51:36 [HOSTNAME] sshd[12446]: Invalid user linux from 178.128.158.113 port 38942 Aug 27 02:56:55 [HOSTNAME] sshd[13046]: User **removed** from 178.128.158.113 not allowed because not listed in AllowUsers Aug 27 03:02:42 [HOSTNAME] sshd[13710]: User **removed** from 178.128.158.113 not allowed because not listed in AllowUsers ... |
2019-08-27 10:15:07 |