City: unknown
Region: unknown
Country: Bulgaria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.70.149.134 | attack | Hack |
2024-03-01 15:04:53 |
| 212.70.149.72 | bots | Apr 21 11:17:27 mail dovecot: auth: passwd-file(tata@example.com,212.70.149.72): unknown user (SHA1 of given password: b3aca9) Apr 21 11:17:29 mail postfix/smtps/smtpd[1933]: warning: unknown[212.70.149.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 21 11:17:34 mail postfix/smtps/smtpd[1933]: lost connection after AUTH from unknown[212.70.149.72] Apr 21 11:17:34 mail postfix/smtps/smtpd[1933]: disconnect from unknown[212.70.149.72] ehlo=1 auth=0/1 rset=1 commands=2/3 Apr 21 11:18:31 mail postfix/smtps/smtpd[1933]: connect from unknown[212.70.149.72] Apr 21 11:18:41 mail postfix/smtps/smtpd[1933]: Anonymous TLS connection established from unknown[212.70.149.72]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits) Apr 21 11:19:09 mail dovecot: auth: passwd-file(cent@example.com,212.70.149.72): unknown user (SHA1 of given password: b3aca9) Apr 21 11:19:11 mail postfix/smtps/smtpd[1933]: warning: unknown[212.70.149.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 21 11:19:16 mail postfix/smtps/smtpd[1933]: lost connection after AUTH from unknown[212.70.149.72] Apr 21 11:19:16 mail postfix/smtps/smtpd[1933]: disconnect from unknown[212.70.149.72] ehlo=1 auth=0/1 rset=1 commands=2/3 Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max connection rate 1/60s for (smtps:212.70.149.72) at Apr 21 11:13:35 Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max connection count 1 for (smtps:212.70.149.72) at Apr 21 11:13:35 Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max cache size 1 at Apr 21 11:13:35 |
2022-04-21 11:27:10 |
| 212.70.149.72 | bots | Apr 21 11:17:27 mail dovecot: auth: passwd-file(tata@example.com,212.70.149.72): unknown user (SHA1 of given password: b3aca9) Apr 21 11:17:29 mail postfix/smtps/smtpd[1933]: warning: unknown[212.70.149.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 21 11:17:34 mail postfix/smtps/smtpd[1933]: lost connection after AUTH from unknown[212.70.149.72] Apr 21 11:17:34 mail postfix/smtps/smtpd[1933]: disconnect from unknown[212.70.149.72] ehlo=1 auth=0/1 rset=1 commands=2/3 Apr 21 11:18:31 mail postfix/smtps/smtpd[1933]: connect from unknown[212.70.149.72] Apr 21 11:18:41 mail postfix/smtps/smtpd[1933]: Anonymous TLS connection established from unknown[212.70.149.72]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits) Apr 21 11:19:09 mail dovecot: auth: passwd-file(cent@example.com,212.70.149.72): unknown user (SHA1 of given password: b3aca9) Apr 21 11:19:11 mail postfix/smtps/smtpd[1933]: warning: unknown[212.70.149.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 21 11:19:16 mail postfix/smtps/smtpd[1933]: lost connection after AUTH from unknown[212.70.149.72] Apr 21 11:19:16 mail postfix/smtps/smtpd[1933]: disconnect from unknown[212.70.149.72] ehlo=1 auth=0/1 rset=1 commands=2/3 Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max connection rate 1/60s for (smtps:212.70.149.72) at Apr 21 11:13:35 Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max connection count 1 for (smtps:212.70.149.72) at Apr 21 11:13:35 Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max cache size 1 at Apr 21 11:13:35 |
2022-04-21 11:26:44 |
| 212.70.149.71 | spamattack | Mail server attack SMTP |
2021-10-15 09:16:21 |
| 212.70.149.36 | attackspambots | Oct 14 00:55:16 blackbee postfix/smtpd[20435]: warning: unknown[212.70.149.36]: SASL LOGIN authentication failed: authentication failure Oct 14 00:55:33 blackbee postfix/smtpd[20435]: warning: unknown[212.70.149.36]: SASL LOGIN authentication failed: authentication failure Oct 14 00:55:50 blackbee postfix/smtpd[20435]: warning: unknown[212.70.149.36]: SASL LOGIN authentication failed: authentication failure Oct 14 00:56:07 blackbee postfix/smtpd[20435]: warning: unknown[212.70.149.36]: SASL LOGIN authentication failed: authentication failure Oct 14 00:56:23 blackbee postfix/smtpd[20435]: warning: unknown[212.70.149.36]: SASL LOGIN authentication failed: authentication failure ... |
2020-10-14 08:10:57 |
| 212.70.149.52 | attackbotsspam | Oct 14 01:52:52 relay postfix/smtpd\[25669\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:53:17 relay postfix/smtpd\[21341\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:53:42 relay postfix/smtpd\[21341\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:54:07 relay postfix/smtpd\[25312\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:54:32 relay postfix/smtpd\[25312\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-14 07:56:35 |
| 212.70.149.20 | attackbots | Oct 14 01:44:02 srv01 postfix/smtpd\[2787\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:44:04 srv01 postfix/smtpd\[2842\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:44:08 srv01 postfix/smtpd\[5647\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:44:09 srv01 postfix/smtpd\[5656\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 14 01:44:27 srv01 postfix/smtpd\[2842\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-14 07:49:33 |
| 212.70.149.83 | attackspambots | 2020-10-14T01:21:46.638543mail1 postfix/smtpd[4846]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure 2020-10-14T01:22:11.387046mail1 postfix/smtpd[4846]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure 2020-10-14T01:22:37.112335mail1 postfix/smtpd[4846]: warning: unknown[212.70.149.83]: SASL LOGIN authentication failed: authentication failure ... |
2020-10-14 07:28:06 |
| 212.70.149.68 | attack | 2020-10-14 02:02:28 dovecot_login authenticator failed for \(User\) \[212.70.149.68\]: 535 Incorrect authentication data \(set_id=lupus@ift.org.ua\)2020-10-14 02:04:21 dovecot_login authenticator failed for \(User\) \[212.70.149.68\]: 535 Incorrect authentication data \(set_id=lulu@ift.org.ua\)2020-10-14 02:06:14 dovecot_login authenticator failed for \(User\) \[212.70.149.68\]: 535 Incorrect authentication data \(set_id=lst@ift.org.ua\) ... |
2020-10-14 07:08:31 |
| 212.70.149.20 | attack | Oct 13 21:14:01 websrv1.derweidener.de postfix/smtpd[977082]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 21:14:30 websrv1.derweidener.de postfix/smtpd[977082]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 21:14:55 websrv1.derweidener.de postfix/smtpd[977082]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 21:15:24 websrv1.derweidener.de postfix/smtpd[977082]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 21:15:54 websrv1.derweidener.de postfix/smtpd[977082]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-10-14 04:12:34 |
| 212.70.149.68 | attackbotsspam | 2020-10-13T17:33:20.606164mail1 postfix/smtps/smtpd[32542]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: authentication failure 2020-10-13T17:35:16.903893mail1 postfix/smtps/smtpd[32542]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: authentication failure 2020-10-13T17:37:13.305145mail1 postfix/smtps/smtpd[32542]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: authentication failure ... |
2020-10-13 23:44:00 |
| 212.70.149.52 | attackbots | Oct 13 15:48:52 relay postfix/smtpd\[25889\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 15:49:17 relay postfix/smtpd\[32223\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 15:49:42 relay postfix/smtpd\[404\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 15:50:07 relay postfix/smtpd\[25889\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 15:50:32 relay postfix/smtpd\[27643\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-13 21:52:30 |
| 212.70.149.20 | attack | SASL PLAIN auth failed: ruser=... |
2020-10-13 19:36:11 |
| 212.70.149.68 | attackbotsspam | Oct 13 08:55:46 mx postfix/smtps/smtpd\[14650\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 08:55:51 mx postfix/smtps/smtpd\[14650\]: lost connection after AUTH from unknown\[212.70.149.68\] Oct 13 08:57:39 mx postfix/smtps/smtpd\[14650\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 08:57:44 mx postfix/smtps/smtpd\[14650\]: lost connection after AUTH from unknown\[212.70.149.68\] Oct 13 08:59:31 mx postfix/smtps/smtpd\[14650\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-13 14:59:48 |
| 212.70.149.83 | attackspambots | Oct 13 07:33:41 srv01 postfix/smtpd\[7058\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 07:33:43 srv01 postfix/smtpd\[11219\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 07:33:47 srv01 postfix/smtpd\[13493\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 07:33:49 srv01 postfix/smtpd\[13498\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 07:34:06 srv01 postfix/smtpd\[11219\]: warning: unknown\[212.70.149.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-13 13:47:04 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.70.149.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.70.149.64. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:26:27 CST 2025
;; MSG SIZE rcvd: 106
Host 64.149.70.212.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.149.70.212.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.214.25.170 | attackspam | 2020-04-17T15:02:44.0759891495-001 sshd[53378]: Failed password for invalid user fc from 113.214.25.170 port 36596 ssh2 2020-04-17T15:05:17.2670271495-001 sshd[53487]: Invalid user test2 from 113.214.25.170 port 54458 2020-04-17T15:05:17.2750121495-001 sshd[53487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.214.25.170 2020-04-17T15:05:17.2670271495-001 sshd[53487]: Invalid user test2 from 113.214.25.170 port 54458 2020-04-17T15:05:18.9249221495-001 sshd[53487]: Failed password for invalid user test2 from 113.214.25.170 port 54458 ssh2 2020-04-17T15:07:58.7089281495-001 sshd[53551]: Invalid user yr from 113.214.25.170 port 44083 ... |
2020-04-18 03:27:46 |
| 27.115.124.75 | attackspambots | Unauthorized connection attempt detected from IP address 27.115.124.75 to port 8888 |
2020-04-18 03:53:07 |
| 110.35.79.23 | attack | $f2bV_matches |
2020-04-18 03:38:09 |
| 182.61.43.202 | attack | Apr 17 16:16:54 ws12vmsma01 sshd[39394]: Invalid user ubuntu from 182.61.43.202 Apr 17 16:16:56 ws12vmsma01 sshd[39394]: Failed password for invalid user ubuntu from 182.61.43.202 port 45798 ssh2 Apr 17 16:23:03 ws12vmsma01 sshd[40395]: Invalid user jj from 182.61.43.202 ... |
2020-04-18 03:39:04 |
| 192.241.238.153 | attack | Port Scan: Events[1] countPorts[1]: 161 .. |
2020-04-18 04:07:16 |
| 182.61.109.24 | attackbots | Unauthorized SSH login attempts |
2020-04-18 03:37:03 |
| 2.80.168.28 | attackbots | Apr 17 13:16:26 server1 sshd\[25781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.80.168.28 user=root Apr 17 13:16:29 server1 sshd\[25781\]: Failed password for root from 2.80.168.28 port 49446 ssh2 Apr 17 13:20:06 server1 sshd\[26810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.80.168.28 user=root Apr 17 13:20:08 server1 sshd\[26810\]: Failed password for root from 2.80.168.28 port 57078 ssh2 Apr 17 13:23:55 server1 sshd\[27860\]: Invalid user test from 2.80.168.28 ... |
2020-04-18 03:46:15 |
| 222.186.175.183 | attackbotsspam | Apr 17 22:58:32 ift sshd\[7886\]: Failed password for root from 222.186.175.183 port 24272 ssh2Apr 17 22:58:42 ift sshd\[7886\]: Failed password for root from 222.186.175.183 port 24272 ssh2Apr 17 22:58:45 ift sshd\[7886\]: Failed password for root from 222.186.175.183 port 24272 ssh2Apr 17 22:58:51 ift sshd\[7906\]: Failed password for root from 222.186.175.183 port 12046 ssh2Apr 17 22:58:54 ift sshd\[7906\]: Failed password for root from 222.186.175.183 port 12046 ssh2 ... |
2020-04-18 04:07:03 |
| 122.51.241.12 | attackbotsspam | 2020-04-17T19:20:37.374721abusebot-5.cloudsearch.cf sshd[29439]: Invalid user postgres from 122.51.241.12 port 48314 2020-04-17T19:20:37.381527abusebot-5.cloudsearch.cf sshd[29439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.241.12 2020-04-17T19:20:37.374721abusebot-5.cloudsearch.cf sshd[29439]: Invalid user postgres from 122.51.241.12 port 48314 2020-04-17T19:20:39.331936abusebot-5.cloudsearch.cf sshd[29439]: Failed password for invalid user postgres from 122.51.241.12 port 48314 ssh2 2020-04-17T19:24:04.769719abusebot-5.cloudsearch.cf sshd[29531]: Invalid user ob from 122.51.241.12 port 56266 2020-04-17T19:24:04.774928abusebot-5.cloudsearch.cf sshd[29531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.241.12 2020-04-17T19:24:04.769719abusebot-5.cloudsearch.cf sshd[29531]: Invalid user ob from 122.51.241.12 port 56266 2020-04-17T19:24:07.142056abusebot-5.cloudsearch.cf sshd[29531]: Fai ... |
2020-04-18 03:34:14 |
| 205.185.114.206 | normal | Running a tor exit node |
2020-04-18 03:44:20 |
| 59.36.172.8 | attackbots | Unauthorized SSH login attempts |
2020-04-18 03:36:02 |
| 220.76.205.35 | attackspam | (sshd) Failed SSH login from 220.76.205.35 (-): 5 in the last 3600 secs |
2020-04-18 04:03:24 |
| 111.161.74.105 | attackspambots | Unauthorized SSH login attempts |
2020-04-18 03:42:10 |
| 212.47.238.207 | attack | Apr 17 21:17:10 meumeu sshd[3530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.238.207 Apr 17 21:17:12 meumeu sshd[3530]: Failed password for invalid user admin from 212.47.238.207 port 43268 ssh2 Apr 17 21:24:01 meumeu sshd[4962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.238.207 ... |
2020-04-18 03:41:22 |
| 31.13.115.3 | attackspambots | Fail2Ban Ban Triggered HTTP Fake Web Crawler |
2020-04-18 03:51:25 |