City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.125.125.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;205.125.125.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 18:32:50 CST 2025
;; MSG SIZE rcvd: 108
Host 136.125.125.205.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 136.125.125.205.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.202.109.244 | attack | Dec 30 21:13:38 localhost sshd\[25347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.109.244 user=root Dec 30 21:13:40 localhost sshd\[25347\]: Failed password for root from 190.202.109.244 port 59506 ssh2 Dec 30 21:14:43 localhost sshd\[25445\]: Invalid user foo from 190.202.109.244 port 40192 |
2019-12-31 04:20:01 |
| 46.229.168.146 | attack | The IP has triggered Cloudflare WAF. CF-Ray: 54d2c57bed74ea28 | WAF_Rule_ID: 1bd9f7863d3d4d8faf68c16295216fb5 | WAF_Kind: firewall | CF_Action: allow | Country: US | CF_IPClass: searchEngine | Protocol: HTTP/1.1 | Method: GET | Host: www.wevg.org | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-31 04:18:04 |
| 103.194.90.34 | attackbotsspam | 103.194.90.34 - - [28/Dec/2019:13:34:16 +0100] "GET /awstats.pl?lang=en&output=main HTTP/1.0" 404 280 "https://oraux.pnzone.net/" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.6 Safari/537.36" |
2019-12-31 03:56:53 |
| 191.34.74.55 | attack | 2019-12-30T19:38:13.421121shield sshd\[7490\]: Invalid user za from 191.34.74.55 port 58820 2019-12-30T19:38:13.426515shield sshd\[7490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.74.55 2019-12-30T19:38:15.557495shield sshd\[7490\]: Failed password for invalid user za from 191.34.74.55 port 58820 ssh2 2019-12-30T19:42:10.076494shield sshd\[8577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.74.55 user=root 2019-12-30T19:42:11.741110shield sshd\[8577\]: Failed password for root from 191.34.74.55 port 57763 ssh2 |
2019-12-31 03:55:47 |
| 49.145.230.5 | attackbotsspam | 1577717087 - 12/30/2019 15:44:47 Host: 49.145.230.5/49.145.230.5 Port: 445 TCP Blocked |
2019-12-31 03:51:06 |
| 189.12.94.229 | attackbots | 1577736882 - 12/30/2019 21:14:42 Host: 189.12.94.229/189.12.94.229 Port: 22 TCP Blocked |
2019-12-31 04:21:22 |
| 41.73.252.236 | attack | 2019-09-12T04:27:43.224649suse-nuc sshd[17378]: Invalid user admin from 41.73.252.236 port 55694 ... |
2019-12-31 04:16:21 |
| 46.229.168.154 | attackspambots | Malicious Traffic/Form Submission |
2019-12-31 04:15:50 |
| 149.28.30.70 | attackbotsspam | Dec 30 15:44:15 debian-2gb-nbg1-2 kernel: \[1369761.721965\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=149.28.30.70 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=29360 DF PROTO=TCP SPT=51888 DPT=3389 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-12-31 04:14:38 |
| 81.4.150.134 | attack | Dec 30 21:10:35 plex sshd[20449]: Failed password for invalid user 1023xzc from 81.4.150.134 port 47018 ssh2 Dec 30 21:10:33 plex sshd[20449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.150.134 Dec 30 21:10:33 plex sshd[20449]: Invalid user 1023xzc from 81.4.150.134 port 47018 Dec 30 21:10:35 plex sshd[20449]: Failed password for invalid user 1023xzc from 81.4.150.134 port 47018 ssh2 Dec 30 21:14:45 plex sshd[20469]: Invalid user gultekin from 81.4.150.134 port 60458 |
2019-12-31 04:20:28 |
| 79.166.215.9 | attackspambots | Telnet Server BruteForce Attack |
2019-12-31 03:53:26 |
| 49.88.112.116 | attack | Unauthorized connection attempt detected from IP address 49.88.112.116 to port 22 |
2019-12-31 03:43:19 |
| 59.48.244.150 | attackspam | Unauthorized connection attempt detected from IP address 59.48.244.150 to port 445 |
2019-12-31 03:41:53 |
| 49.88.112.74 | attack | Dec 30 21:14:36 MK-Soft-VM3 sshd[30870]: Failed password for root from 49.88.112.74 port 28102 ssh2 Dec 30 21:14:38 MK-Soft-VM3 sshd[30870]: Failed password for root from 49.88.112.74 port 28102 ssh2 ... |
2019-12-31 04:23:17 |
| 27.155.87.176 | attackspambots | Unauthorized connection attempt detected from IP address 27.155.87.176 to port 2222 |
2019-12-31 03:48:21 |