City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: Genotec AG
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attack | Wordpress attack |
2020-07-30 19:06:51 |
b
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6_10.3 <<>> 2001:1b50::82:195:225:157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24823
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2001:1b50::82:195:225:157. IN A
;; AUTHORITY SECTION:
. 10800 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020073000 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Thu Jul 30 19:23:50 2020
;; MSG SIZE rcvd: 118
7.5.1.0.5.2.2.0.5.9.1.0.2.8.0.0.0.0.0.0.0.0.0.0.0.5.b.1.1.0.0.2.ip6.arpa domain name pointer web-win-225-157.genotec.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
7.5.1.0.5.2.2.0.5.9.1.0.2.8.0.0.0.0.0.0.0.0.0.0.0.5.b.1.1.0.0.2.ip6.arpa name = web-win-225-157.genotec.ch.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 158.69.199.225 | attackbots | Sep 7 07:12:38 powerpi2 sshd[4798]: Failed password for root from 158.69.199.225 port 35167 ssh2 Sep 7 07:15:40 powerpi2 sshd[4923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.199.225 user=root Sep 7 07:15:42 powerpi2 sshd[4923]: Failed password for root from 158.69.199.225 port 48109 ssh2 ... |
2020-09-07 17:48:19 |
| 87.255.25.165 | attackbotsspam | 2 VoIP Fraud Attacks in last 24 hours |
2020-09-07 17:53:00 |
| 88.157.66.158 | attack | 2020-09-06 11:38:30.930021-0500 localhost smtpd[58341]: NOQUEUE: reject: RCPT from unknown[88.157.66.158]: 554 5.7.1 Service unavailable; Client host [88.157.66.158] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/88.157.66.158; from= |
2020-09-07 17:50:29 |
| 61.84.196.50 | attackbots | Sep 7 10:56:37 ns41 sshd[20943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50 Sep 7 10:56:37 ns41 sshd[20943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50 |
2020-09-07 17:28:20 |
| 106.12.173.236 | attackspam | Sep 7 11:37:04 nuernberg-4g-01 sshd[5317]: Failed password for root from 106.12.173.236 port 56025 ssh2 Sep 7 11:39:06 nuernberg-4g-01 sshd[5975]: Failed password for root from 106.12.173.236 port 41434 ssh2 |
2020-09-07 17:59:21 |
| 92.222.75.80 | attackspam | Sep 7 09:21:44 root sshd[11636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80 ... |
2020-09-07 17:44:54 |
| 49.88.112.118 | attack | Sep 7 09:13:00 vm1 sshd[26765]: Failed password for root from 49.88.112.118 port 48083 ssh2 ... |
2020-09-07 17:49:17 |
| 49.235.133.208 | attackspam | 2020-09-06 UTC: (34x) - Administrator,admin,dick,host,hosting,liquide,nagios,oracle,rock,root(22x),test1,usuario,zope |
2020-09-07 17:53:13 |
| 109.77.139.85 | attackspambots | Sep 6 23:08:07 scw-focused-cartwright sshd[12391]: Failed password for root from 109.77.139.85 port 46574 ssh2 |
2020-09-07 17:34:38 |
| 94.241.253.75 | attackbotsspam | 1599410920 - 09/06/2020 18:48:40 Host: 94.241.253.75/94.241.253.75 Port: 445 TCP Blocked |
2020-09-07 17:26:53 |
| 195.136.141.13 | attack | Icarus honeypot on github |
2020-09-07 17:55:30 |
| 85.247.242.96 | attackbotsspam | Wordpress File Manager Plugin Remote Code Execution Vulnerability, PTR: bl14-242-96.dsl.telepac.pt. |
2020-09-07 17:28:55 |
| 142.93.195.249 | attack | Sep 7 11:10:44 ns1 sshd[39890]: Did not receive identification string from 142.93.195.249 port 37134 Sep 7 11:11:01 ns1 sshd[39903]: Unable to negotiate with 142.93.195.249 port 58228: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Sep 7 11:11:13 ns1 sshd[39905]: Unable to negotiate with 142.93.195.249 port 53052: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Sep 7 11:11:24 ns1 sshd[39907]: Unable to negotiate with 142.93.195.249 port 47216: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Sep 7 11:11:34 ns1 sshd[39909]: Unable to negotiate with 142.93.195.249 port 41672: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-e ... |
2020-09-07 17:33:47 |
| 51.38.239.53 | attackbotsspam | Failed password for root from 51.38.239.53 port 51458 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=solution-info-services.fr user=root Failed password for root from 51.38.239.53 port 58096 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=solution-info-services.fr user=root Failed password for root from 51.38.239.53 port 36496 ssh2 |
2020-09-07 17:37:13 |
| 192.42.116.19 | attackbotsspam | Sep 7 09:59:12 vpn01 sshd[30034]: Failed password for root from 192.42.116.19 port 40150 ssh2 Sep 7 09:59:23 vpn01 sshd[30034]: error: maximum authentication attempts exceeded for root from 192.42.116.19 port 40150 ssh2 [preauth] ... |
2020-09-07 17:55:52 |