City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.146.81.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35663
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.146.81.93. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:53:24 CST 2025
;; MSG SIZE rcvd: 106
Host 93.81.146.204.in-addr.arpa not found: 2(SERVFAIL)
server can't find 204.146.81.93.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.92.0.158 | attackspambots | Dec 20 06:48:30 arianus sshd\[31275\]: Unable to negotiate with 218.92.0.158 port 51173: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ... |
2019-12-20 14:05:17 |
| 94.23.196.177 | attack | Dec 20 07:09:57 localhost postfix/smtpd\[8862\]: warning: ns3048742.ip-94-23-196.eu\[94.23.196.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:10:03 localhost postfix/smtpd\[8864\]: warning: ns3048742.ip-94-23-196.eu\[94.23.196.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:10:13 localhost postfix/smtpd\[8862\]: warning: ns3048742.ip-94-23-196.eu\[94.23.196.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:10:36 localhost postfix/smtpd\[8864\]: warning: ns3048742.ip-94-23-196.eu\[94.23.196.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:10:42 localhost postfix/smtpd\[8456\]: warning: ns3048742.ip-94-23-196.eu\[94.23.196.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-20 14:20:17 |
| 14.236.147.21 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.236.147.21 to port 445 |
2019-12-20 13:56:54 |
| 80.211.78.132 | attack | Dec 20 07:04:37 vpn01 sshd[24766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.132 Dec 20 07:04:40 vpn01 sshd[24766]: Failed password for invalid user osix from 80.211.78.132 port 58628 ssh2 ... |
2019-12-20 14:09:23 |
| 206.189.156.198 | attack | Dec 19 20:18:01 auw2 sshd\[17204\]: Invalid user lana from 206.189.156.198 Dec 19 20:18:01 auw2 sshd\[17204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.198 Dec 19 20:18:03 auw2 sshd\[17204\]: Failed password for invalid user lana from 206.189.156.198 port 43514 ssh2 Dec 19 20:23:57 auw2 sshd\[17824\]: Invalid user sexsex from 206.189.156.198 Dec 19 20:23:57 auw2 sshd\[17824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.198 |
2019-12-20 14:25:39 |
| 92.249.212.117 | attack | " " |
2019-12-20 13:49:58 |
| 46.38.144.17 | attackbotsspam | Dec 20 07:11:01 webserver postfix/smtpd\[27288\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:12:33 webserver postfix/smtpd\[27288\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:14:01 webserver postfix/smtpd\[27288\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:15:31 webserver postfix/smtpd\[27288\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 20 07:17:00 webserver postfix/smtpd\[28102\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-20 14:23:02 |
| 180.149.212.122 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-20 14:29:47 |
| 222.186.175.161 | attackspam | Dec 20 06:50:02 meumeu sshd[18506]: Failed password for root from 222.186.175.161 port 15982 ssh2 Dec 20 06:50:18 meumeu sshd[18506]: error: maximum authentication attempts exceeded for root from 222.186.175.161 port 15982 ssh2 [preauth] Dec 20 06:50:24 meumeu sshd[18554]: Failed password for root from 222.186.175.161 port 50408 ssh2 ... |
2019-12-20 13:59:07 |
| 14.63.167.192 | attackspambots | Dec 19 19:46:44 web9 sshd\[18849\]: Invalid user luccisano from 14.63.167.192 Dec 19 19:46:44 web9 sshd\[18849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 Dec 19 19:46:46 web9 sshd\[18849\]: Failed password for invalid user luccisano from 14.63.167.192 port 32956 ssh2 Dec 19 19:53:12 web9 sshd\[19900\]: Invalid user frankenberger from 14.63.167.192 Dec 19 19:53:12 web9 sshd\[19900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 |
2019-12-20 13:54:20 |
| 36.85.217.173 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 04:55:16. |
2019-12-20 14:27:52 |
| 185.175.93.17 | attackspambots | 12/20/2019-00:57:54.111322 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-12-20 14:05:51 |
| 222.186.180.147 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147 user=root Failed password for root from 222.186.180.147 port 38908 ssh2 Failed password for root from 222.186.180.147 port 38908 ssh2 Failed password for root from 222.186.180.147 port 38908 ssh2 Failed password for root from 222.186.180.147 port 38908 ssh2 |
2019-12-20 14:03:56 |
| 49.51.132.82 | attackbotsspam | SSH Bruteforce attempt |
2019-12-20 13:52:36 |
| 103.102.192.106 | attackbots | Dec 20 06:34:34 OPSO sshd\[6246\]: Invalid user guadalupe from 103.102.192.106 port 8067 Dec 20 06:34:34 OPSO sshd\[6246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.102.192.106 Dec 20 06:34:36 OPSO sshd\[6246\]: Failed password for invalid user guadalupe from 103.102.192.106 port 8067 ssh2 Dec 20 06:42:35 OPSO sshd\[7872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.102.192.106 user=root Dec 20 06:42:37 OPSO sshd\[7872\]: Failed password for root from 103.102.192.106 port 1356 ssh2 |
2019-12-20 14:06:22 |