City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.192.16.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.192.16.134. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:52:04 CST 2025
;; MSG SIZE rcvd: 106
Host 134.16.192.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.16.192.21.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 194.5.94.160 | attackspam | Oct 7 20:50:21 our-server-hostname postfix/smtpd[22671]: connect from unknown[194.5.94.160] Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct 7 20:50:31 our-server-hostname postfix/smtpd[22671]: too many errors after DATA from unknown[194.5.94.160] Oct 7 20:50:31 our-server-hostname postfix/smtpd[22671]: disconnect from unknown[194.5.94.160] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=194.5.94.160 |
2019-10-07 22:07:28 |
| 178.35.143.118 | attack | Oct 7 13:39:38 h2570396 sshd[1360]: reveeclipse mapping checking getaddrinfo for dsl-178-35-143-118.avtlg.ru [178.35.143.118] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 7 13:39:38 h2570396 sshd[1360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.35.143.118 user=r.r Oct 7 13:39:40 h2570396 sshd[1360]: Failed password for r.r from 178.35.143.118 port 52895 ssh2 Oct 7 13:39:42 h2570396 sshd[1360]: Failed password for r.r from 178.35.143.118 port 52895 ssh2 Oct 7 13:39:45 h2570396 sshd[1360]: Failed password for r.r from 178.35.143.118 port 52895 ssh2 Oct 7 13:39:47 h2570396 sshd[1360]: Failed password for r.r from 178.35.143.118 port 52895 ssh2 Oct 7 13:39:49 h2570396 sshd[1360]: Failed password for r.r from 178.35.143.118 port 52895 ssh2 Oct 7 13:39:51 h2570396 sshd[1360]: Failed password for r.r from 178.35.143.118 port 52895 ssh2 Oct 7 13:39:51 h2570396 sshd[1360]: Disconnecting: Too many authentication failures for ........ ------------------------------- |
2019-10-07 22:05:41 |
| 119.115.205.218 | attack | Unauthorised access (Oct 7) SRC=119.115.205.218 LEN=40 TTL=49 ID=14549 TCP DPT=8080 WINDOW=63239 SYN |
2019-10-07 22:01:49 |
| 222.186.31.136 | attackspambots | 2019-10-07T21:26:19.895588enmeeting.mahidol.ac.th sshd\[7475\]: User root from 222.186.31.136 not allowed because not listed in AllowUsers 2019-10-07T21:26:20.289724enmeeting.mahidol.ac.th sshd\[7475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136 user=root 2019-10-07T21:26:23.042004enmeeting.mahidol.ac.th sshd\[7475\]: Failed password for invalid user root from 222.186.31.136 port 42150 ssh2 ... |
2019-10-07 22:28:20 |
| 208.115.237.90 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-07 22:14:20 |
| 45.136.109.253 | attack | slow and persistent scanner |
2019-10-07 22:40:53 |
| 132.148.104.129 | attack | jannisjulius.de 132.148.104.129 \[07/Oct/2019:13:45:16 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 3563 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1" jannisjulius.de 132.148.104.129 \[07/Oct/2019:13:45:18 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 3563 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 5.1\; en-US\; rv:1.9.0.1\) Gecko/2008070208 Firefox/3.0.1" |
2019-10-07 22:25:37 |
| 183.80.75.247 | attackspam | Unauthorised access (Oct 7) SRC=183.80.75.247 LEN=40 TTL=48 ID=62294 TCP DPT=8080 WINDOW=19710 SYN Unauthorised access (Oct 7) SRC=183.80.75.247 LEN=40 TTL=48 ID=56945 TCP DPT=8080 WINDOW=5806 SYN Unauthorised access (Oct 7) SRC=183.80.75.247 LEN=40 TTL=48 ID=28771 TCP DPT=8080 WINDOW=19710 SYN Unauthorised access (Oct 6) SRC=183.80.75.247 LEN=40 TTL=48 ID=11692 TCP DPT=8080 WINDOW=5806 SYN Unauthorised access (Oct 6) SRC=183.80.75.247 LEN=40 TTL=48 ID=52379 TCP DPT=8080 WINDOW=19710 SYN Unauthorised access (Oct 6) SRC=183.80.75.247 LEN=40 TTL=48 ID=23242 TCP DPT=8080 WINDOW=5806 SYN |
2019-10-07 22:37:54 |
| 222.186.175.154 | attackspam | Oct 7 09:44:50 xentho sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Oct 7 09:44:52 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2 Oct 7 09:44:56 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2 Oct 7 09:44:50 xentho sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Oct 7 09:44:52 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2 Oct 7 09:44:56 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2 Oct 7 09:44:50 xentho sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Oct 7 09:44:52 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2 Oct 7 09:44:56 xentho sshd[25514]: Failed password for r ... |
2019-10-07 22:08:12 |
| 65.151.157.14 | attackspam | Oct 7 16:36:31 core sshd[3454]: Invalid user Aero2017 from 65.151.157.14 port 40598 Oct 7 16:36:33 core sshd[3454]: Failed password for invalid user Aero2017 from 65.151.157.14 port 40598 ssh2 ... |
2019-10-07 22:42:19 |
| 89.163.140.254 | attackspambots | Triggered by Fail2Ban at Vostok web server |
2019-10-07 22:33:12 |
| 75.152.46.77 | attackspam | port scan and connect, tcp 23 (telnet) |
2019-10-07 22:03:07 |
| 139.59.17.118 | attack | Oct 7 16:08:34 ns41 sshd[27393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.118 |
2019-10-07 22:40:12 |
| 217.18.135.235 | attackbots | Oct 7 13:44:53 DAAP sshd[25936]: Invalid user CENTOS@1234 from 217.18.135.235 port 47362 ... |
2019-10-07 22:41:22 |
| 222.186.15.160 | attackspam | Oct 7 16:37:02 vmd17057 sshd\[23985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160 user=root Oct 7 16:37:04 vmd17057 sshd\[23985\]: Failed password for root from 222.186.15.160 port 49394 ssh2 Oct 7 16:37:06 vmd17057 sshd\[23985\]: Failed password for root from 222.186.15.160 port 49394 ssh2 ... |
2019-10-07 22:38:28 |