City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.100.49.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.100.49.0. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:41:11 CST 2025
;; MSG SIZE rcvd: 104
Host 0.49.100.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 0.49.100.20.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 128.199.170.33 | attackspam | Mar 24 08:48:10 minden010 sshd[7515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33 Mar 24 08:48:12 minden010 sshd[7515]: Failed password for invalid user radiusd from 128.199.170.33 port 56730 ssh2 Mar 24 08:54:22 minden010 sshd[8929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.170.33 ... |
2020-03-24 16:53:53 |
| 45.167.250.19 | attackspam | $f2bV_matches |
2020-03-24 16:58:29 |
| 27.105.103.3 | attackspam | Invalid user daniel from 27.105.103.3 port 34450 |
2020-03-24 16:36:17 |
| 114.235.216.176 | attackspambots | Spammer |
2020-03-24 17:10:02 |
| 185.36.81.78 | attackspam | Mar 24 09:32:54 srv01 postfix/smtpd\[27104\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 24 09:38:04 srv01 postfix/smtpd\[27104\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 24 09:39:35 srv01 postfix/smtpd\[27104\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 24 09:40:09 srv01 postfix/smtpd\[27104\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 24 09:44:13 srv01 postfix/smtpd\[1052\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-24 16:51:31 |
| 218.92.0.189 | attack | 03/24/2020-05:22:10.666230 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan |
2020-03-24 17:22:20 |
| 41.89.162.197 | attack | Mar 23 21:07:47 php1 sshd\[9530\]: Invalid user masako from 41.89.162.197 Mar 23 21:07:47 php1 sshd\[9530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.162.197 Mar 23 21:07:49 php1 sshd\[9530\]: Failed password for invalid user masako from 41.89.162.197 port 37612 ssh2 Mar 23 21:12:40 php1 sshd\[10134\]: Invalid user go from 41.89.162.197 Mar 23 21:12:40 php1 sshd\[10134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.162.197 |
2020-03-24 16:39:05 |
| 49.232.13.96 | attackbots | Mar 24 09:59:52 srv206 sshd[21673]: Invalid user ui from 49.232.13.96 Mar 24 09:59:52 srv206 sshd[21673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.13.96 Mar 24 09:59:52 srv206 sshd[21673]: Invalid user ui from 49.232.13.96 Mar 24 09:59:53 srv206 sshd[21673]: Failed password for invalid user ui from 49.232.13.96 port 42964 ssh2 ... |
2020-03-24 17:18:27 |
| 45.134.179.57 | attack | Mar 24 10:08:38 debian-2gb-nbg1-2 kernel: \[7300003.244468\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38333 PROTO=TCP SPT=58352 DPT=63789 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-24 17:12:16 |
| 71.76.81.191 | attackbots | fail2ban - Attack against Apache (too many 404s) |
2020-03-24 17:11:09 |
| 222.223.93.11 | attackbots | Mar 24 08:06:48 XXX sshd[44620]: Invalid user bwadmin from 222.223.93.11 port 2873 |
2020-03-24 17:07:39 |
| 134.122.118.21 | attack | 2020-03-24T09:08:37.323793micro sshd[1607]: Disconnected from 134.122.118.21 port 45984 [preauth] 2020-03-24T09:08:37.480439micro sshd[1609]: Invalid user admin from 134.122.118.21 port 47406 2020-03-24T09:08:37.493177micro sshd[1609]: Disconnected from 134.122.118.21 port 47406 [preauth] 2020-03-24T09:08:37.643692micro sshd[1611]: Invalid user admin from 134.122.118.21 port 48700 2020-03-24T09:08:37.659841micro sshd[1611]: Disconnected from 134.122.118.21 port 48700 [preauth] ... |
2020-03-24 17:09:08 |
| 54.38.139.210 | attackbotsspam | 2020-03-24T07:33:26.137532abusebot.cloudsearch.cf sshd[2679]: Invalid user gnats from 54.38.139.210 port 58868 2020-03-24T07:33:26.144386abusebot.cloudsearch.cf sshd[2679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.139.210 2020-03-24T07:33:26.137532abusebot.cloudsearch.cf sshd[2679]: Invalid user gnats from 54.38.139.210 port 58868 2020-03-24T07:33:28.559911abusebot.cloudsearch.cf sshd[2679]: Failed password for invalid user gnats from 54.38.139.210 port 58868 ssh2 2020-03-24T07:41:14.014319abusebot.cloudsearch.cf sshd[3166]: Invalid user write from 54.38.139.210 port 50400 2020-03-24T07:41:14.024000abusebot.cloudsearch.cf sshd[3166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.139.210 2020-03-24T07:41:14.014319abusebot.cloudsearch.cf sshd[3166]: Invalid user write from 54.38.139.210 port 50400 2020-03-24T07:41:16.683123abusebot.cloudsearch.cf sshd[3166]: Failed password for invalid us ... |
2020-03-24 17:01:04 |
| 173.249.57.253 | attackbots | Mar 24 06:52:08 vpn01 sshd[21687]: Failed password for root from 173.249.57.253 port 37298 ssh2 Mar 24 06:52:20 vpn01 sshd[21687]: error: maximum authentication attempts exceeded for root from 173.249.57.253 port 37298 ssh2 [preauth] ... |
2020-03-24 16:53:37 |
| 99.185.76.161 | attack | (sshd) Failed SSH login from 99.185.76.161 (US/United States/99-185-76-161.lightspeed.clmasc.sbcglobal.net): 10 in the last 3600 secs |
2020-03-24 16:47:00 |