City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.192.104.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.192.104.52. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:19:26 CST 2025
;; MSG SIZE rcvd: 107
Host 52.104.192.204.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 52.104.192.204.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.211.46.60 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-10-29 16:50:23 |
| 46.233.48.107 | attack | port scan and connect, tcp 8888 (sun-answerbook) |
2019-10-29 16:59:03 |
| 196.192.110.67 | attackbotsspam | Oct 29 08:07:01 ms-srv sshd[61525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.67 Oct 29 08:07:03 ms-srv sshd[61525]: Failed password for invalid user nasec from 196.192.110.67 port 50806 ssh2 |
2019-10-29 17:13:22 |
| 95.173.186.148 | attackbots | Oct 29 04:46:23 legacy sshd[6547]: Failed password for root from 95.173.186.148 port 46464 ssh2 Oct 29 04:50:29 legacy sshd[6670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.173.186.148 Oct 29 04:50:32 legacy sshd[6670]: Failed password for invalid user ubuntu8 from 95.173.186.148 port 57140 ssh2 ... |
2019-10-29 16:39:18 |
| 35.185.239.108 | attack | Automatic report - Banned IP Access |
2019-10-29 17:09:44 |
| 123.207.16.96 | attackbots | Oct 29 03:50:28 thevastnessof sshd[25988]: Failed password for root from 123.207.16.96 port 45868 ssh2 ... |
2019-10-29 16:41:04 |
| 106.13.48.157 | attack | Oct 29 10:01:04 vps691689 sshd[18401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.157 Oct 29 10:01:06 vps691689 sshd[18401]: Failed password for invalid user china from 106.13.48.157 port 49624 ssh2 ... |
2019-10-29 17:08:56 |
| 150.95.174.36 | attackbots | Oct 29 09:45:28 MK-Soft-VM4 sshd[15217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.174.36 Oct 29 09:45:30 MK-Soft-VM4 sshd[15217]: Failed password for invalid user etfile from 150.95.174.36 port 33876 ssh2 ... |
2019-10-29 16:56:55 |
| 175.143.46.233 | attackbots | Oct 28 13:18:41 xxxxxxx8434580 sshd[3565]: Invalid user m51 from 175.143.46.233 Oct 28 13:18:41 xxxxxxx8434580 sshd[3565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.46.233 Oct 28 13:18:43 xxxxxxx8434580 sshd[3565]: Failed password for invalid user m51 from 175.143.46.233 port 40402 ssh2 Oct 28 13:18:44 xxxxxxx8434580 sshd[3565]: Received disconnect from 175.143.46.233: 11: Bye Bye [preauth] Oct 28 13:32:30 xxxxxxx8434580 sshd[3629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.46.233 user=r.r Oct 28 13:32:32 xxxxxxx8434580 sshd[3629]: Failed password for r.r from 175.143.46.233 port 42700 ssh2 Oct 28 13:32:32 xxxxxxx8434580 sshd[3629]: Received disconnect from 175.143.46.233: 11: Bye Bye [preauth] Oct 28 13:37:17 xxxxxxx8434580 sshd[3631]: Invalid user user from 175.143.46.233 Oct 28 13:37:17 xxxxxxx8434580 sshd[3631]: pam_unix(sshd:auth): authentication failure; l........ ------------------------------- |
2019-10-29 17:11:25 |
| 161.0.153.211 | attackspam | Automatic report - Port Scan Attack |
2019-10-29 16:34:25 |
| 43.246.143.70 | attackbots | SMB Server BruteForce Attack |
2019-10-29 16:40:33 |
| 103.208.34.199 | attackspambots | Oct 29 06:25:41 server sshd\[6432\]: Invalid user internet123 from 103.208.34.199 port 59208 Oct 29 06:25:41 server sshd\[6432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.34.199 Oct 29 06:25:43 server sshd\[6432\]: Failed password for invalid user internet123 from 103.208.34.199 port 59208 ssh2 Oct 29 06:29:45 server sshd\[24260\]: Invalid user 121233 from 103.208.34.199 port 42054 Oct 29 06:29:45 server sshd\[24260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.34.199 |
2019-10-29 16:47:35 |
| 117.85.106.189 | attackbotsspam | Oct 28 23:50:01 esmtp postfix/smtpd[24195]: lost connection after AUTH from unknown[117.85.106.189] Oct 28 23:50:02 esmtp postfix/smtpd[24197]: lost connection after AUTH from unknown[117.85.106.189] Oct 28 23:50:04 esmtp postfix/smtpd[24195]: lost connection after AUTH from unknown[117.85.106.189] Oct 28 23:50:05 esmtp postfix/smtpd[24197]: lost connection after AUTH from unknown[117.85.106.189] Oct 28 23:50:06 esmtp postfix/smtpd[24195]: lost connection after AUTH from unknown[117.85.106.189] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=117.85.106.189 |
2019-10-29 16:52:01 |
| 185.211.245.170 | attackbots | 2019-10-29T09:48:42.278769mail01 postfix/smtpd[14354]: warning: unknown[185.211.245.170]: SASL PLAIN authentication failed: 2019-10-29T09:48:49.026441mail01 postfix/smtpd[7816]: warning: unknown[185.211.245.170]: SASL PLAIN authentication failed: 2019-10-29T09:49:53.465020mail01 postfix/smtpd[14643]: warning: unknown[185.211.245.170]: SASL PLAIN authentication failed: |
2019-10-29 17:02:31 |
| 128.199.161.98 | attack | www.eintrachtkultkellerfulda.de 128.199.161.98 \[29/Oct/2019:07:49:18 +0100\] "POST /wp-login.php HTTP/1.1" 200 2066 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.eintrachtkultkellerfulda.de 128.199.161.98 \[29/Oct/2019:07:49:20 +0100\] "POST /wp-login.php HTTP/1.1" 200 2030 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-29 17:03:29 |