City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.250.42.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.250.42.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 19:22:38 CST 2025
;; MSG SIZE rcvd: 105
Host 89.42.250.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 89.42.250.20.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
139.59.58.254 | attackspam | Aug 15 14:07:26 wbs sshd\[23506\]: Invalid user git from 139.59.58.254 Aug 15 14:07:26 wbs sshd\[23506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.254 Aug 15 14:07:29 wbs sshd\[23506\]: Failed password for invalid user git from 139.59.58.254 port 37042 ssh2 Aug 15 14:13:37 wbs sshd\[24168\]: Invalid user kayten from 139.59.58.254 Aug 15 14:13:37 wbs sshd\[24168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.254 |
2019-08-16 08:17:32 |
157.230.225.77 | attack | Aug 15 14:19:07 web9 sshd\[16492\]: Invalid user ch from 157.230.225.77 Aug 15 14:19:07 web9 sshd\[16492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.225.77 Aug 15 14:19:09 web9 sshd\[16492\]: Failed password for invalid user ch from 157.230.225.77 port 49786 ssh2 Aug 15 14:23:10 web9 sshd\[17477\]: Invalid user usuario from 157.230.225.77 Aug 15 14:23:10 web9 sshd\[17477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.225.77 |
2019-08-16 08:29:39 |
211.253.25.21 | attack | Aug 16 03:03:42 yabzik sshd[14570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.25.21 Aug 16 03:03:44 yabzik sshd[14570]: Failed password for invalid user tester from 211.253.25.21 port 39898 ssh2 Aug 16 03:08:53 yabzik sshd[16321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.25.21 |
2019-08-16 08:22:43 |
62.210.113.223 | attack | eintrachtkultkellerfulda.de 62.210.113.223 \[16/Aug/2019:02:04:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 1822 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" eintrachtkultkellerfulda.de 62.210.113.223 \[16/Aug/2019:02:04:54 +0200\] "POST /wp-login.php HTTP/1.1" 200 2027 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-08-16 08:23:39 |
212.83.143.57 | attackbots | Aug 15 19:54:58 plusreed sshd[27070]: Invalid user tester from 212.83.143.57 ... |
2019-08-16 08:28:16 |
219.90.67.89 | attack | Aug 16 02:30:18 v22019058497090703 sshd[21039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.90.67.89 Aug 16 02:30:19 v22019058497090703 sshd[21039]: Failed password for invalid user popd from 219.90.67.89 port 36456 ssh2 Aug 16 02:35:36 v22019058497090703 sshd[21426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.90.67.89 ... |
2019-08-16 08:44:30 |
206.189.119.73 | attackbotsspam | Aug 16 08:13:51 localhost sshd[19245]: Invalid user rg from 206.189.119.73 port 44964 ... |
2019-08-16 08:16:27 |
222.108.178.119 | attackbots | 23/tcp [2019-08-15]1pkt |
2019-08-16 08:51:14 |
114.236.218.134 | attack | 22/tcp [2019-08-15]1pkt |
2019-08-16 08:49:06 |
54.38.82.14 | attackspam | Aug 15 20:32:25 vps200512 sshd\[28108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root Aug 15 20:32:26 vps200512 sshd\[28108\]: Failed password for root from 54.38.82.14 port 44875 ssh2 Aug 15 20:32:27 vps200512 sshd\[28110\]: Invalid user admin from 54.38.82.14 Aug 15 20:32:27 vps200512 sshd\[28110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 Aug 15 20:32:28 vps200512 sshd\[28110\]: Failed password for invalid user admin from 54.38.82.14 port 50368 ssh2 |
2019-08-16 08:50:50 |
177.21.131.131 | attack | Aug 15 22:08:59 rigel postfix/smtpd[23916]: connect from unknown[177.21.131.131] Aug 15 22:09:02 rigel postfix/smtpd[23916]: warning: unknown[177.21.131.131]: SASL CRAM-MD5 authentication failed: authentication failure Aug 15 22:09:03 rigel postfix/smtpd[23916]: warning: unknown[177.21.131.131]: SASL PLAIN authentication failed: authentication failure Aug 15 22:09:04 rigel postfix/smtpd[23916]: warning: unknown[177.21.131.131]: SASL LOGIN authentication failed: authentication failure Aug 15 22:09:05 rigel postfix/smtpd[23916]: disconnect from unknown[177.21.131.131] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=177.21.131.131 |
2019-08-16 08:31:13 |
128.199.194.9 | attackspambots | Aug 16 01:07:19 debian sshd\[2031\]: Invalid user madalina from 128.199.194.9 port 50981 Aug 16 01:07:19 debian sshd\[2031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.194.9 ... |
2019-08-16 08:13:03 |
77.247.109.35 | attackspambots | \[2019-08-15 20:14:39\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-15T20:14:39.963-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470519",SessionID="0x7ff4d0155c88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.35/61899",ACLName="no_extension_match" \[2019-08-15 20:15:50\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-15T20:15:50.803-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441519470519",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.35/58161",ACLName="no_extension_match" \[2019-08-15 20:17:03\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-15T20:17:03.435-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9009441519470519",SessionID="0x7ff4d07952f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.35/61469",ACLName="no_e |
2019-08-16 08:17:49 |
93.120.198.170 | attack | Aug 15 21:46:16 m1 sshd[2868]: Failed password for r.r from 93.120.198.170 port 59409 ssh2 Aug 15 21:46:17 m1 sshd[2868]: Failed password for r.r from 93.120.198.170 port 59409 ssh2 Aug 15 21:46:20 m1 sshd[2868]: Failed password for r.r from 93.120.198.170 port 59409 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.120.198.170 |
2019-08-16 08:49:22 |
154.8.185.122 | attackspambots | $f2bV_matches |
2019-08-16 08:39:13 |