City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.146.12.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.146.12.160. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 00:09:31 CST 2025
;; MSG SIZE rcvd: 107
Host 160.12.146.213.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 160.12.146.213.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 223.194.45.84 | attackbotsspam | 2019-10-30 20:07:31,958 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:23:09,980 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:39:01,003 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:58:53,582 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 21:18:58,795 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:07:31,958 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:23:09,980 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:39:01,003 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:58:53,582 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 21:18:58,795 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 20:07:31,958 fail2ban.actions \[1865\]: NOTICE \[ssh\] Ban 223.194.45.84 2019-10-30 2 |
2019-11-01 03:10:11 |
| 218.92.0.200 | attackbotsspam | Oct 31 19:09:35 venus sshd\[15417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200 user=root Oct 31 19:09:36 venus sshd\[15417\]: Failed password for root from 218.92.0.200 port 26909 ssh2 Oct 31 19:09:38 venus sshd\[15417\]: Failed password for root from 218.92.0.200 port 26909 ssh2 ... |
2019-11-01 03:11:41 |
| 66.249.64.155 | attack | Automatic report - Banned IP Access |
2019-11-01 02:45:44 |
| 151.84.105.118 | attack | Oct 31 17:46:10 server sshd\[5004\]: User root from 151.84.105.118 not allowed because listed in DenyUsers Oct 31 17:46:10 server sshd\[5004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.105.118 user=root Oct 31 17:46:12 server sshd\[5004\]: Failed password for invalid user root from 151.84.105.118 port 44440 ssh2 Oct 31 17:51:46 server sshd\[2889\]: User root from 151.84.105.118 not allowed because listed in DenyUsers Oct 31 17:51:46 server sshd\[2889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.105.118 user=root |
2019-11-01 03:05:39 |
| 80.82.64.130 | attack | Auto reported by IDS |
2019-11-01 02:56:26 |
| 209.53.113.225 | attack | POST to Dotted Quad with Fake Browser |
2019-11-01 02:41:02 |
| 13.228.31.124 | attackspam | RDP Bruteforce |
2019-11-01 03:02:24 |
| 216.198.73.88 | attackbots | " " |
2019-11-01 02:58:11 |
| 112.85.42.186 | attackspambots | Nov 1 00:29:24 areeb-Workstation sshd[11388]: Failed password for root from 112.85.42.186 port 10909 ssh2 ... |
2019-11-01 03:00:57 |
| 37.49.231.158 | attackspam | *Port Scan* detected from 37.49.231.158 (NL/Netherlands/-). 4 hits in the last 215 seconds |
2019-11-01 02:50:12 |
| 46.166.190.148 | attack | Postfix Brute-Force reported by Fail2Ban |
2019-11-01 03:06:46 |
| 118.24.158.42 | attack | Oct 30 10:06:08 shadeyouvpn sshd[7000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.158.42 user=admin Oct 30 10:06:10 shadeyouvpn sshd[7000]: Failed password for admin from 118.24.158.42 port 40724 ssh2 Oct 30 10:06:10 shadeyouvpn sshd[7000]: Received disconnect from 118.24.158.42: 11: Bye Bye [preauth] Oct 30 10:30:28 shadeyouvpn sshd[25129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.158.42 user=r.r Oct 30 10:30:30 shadeyouvpn sshd[25129]: Failed password for r.r from 118.24.158.42 port 59432 ssh2 Oct 30 10:30:30 shadeyouvpn sshd[25129]: Received disconnect from 118.24.158.42: 11: Bye Bye [preauth] Oct 30 10:35:11 shadeyouvpn sshd[29491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.158.42 user=r.r Oct 30 10:35:13 shadeyouvpn sshd[29491]: Failed password for r.r from 118.24.158.42 port 40360 ssh2 Oct 30 10:35:13 sh........ ------------------------------- |
2019-11-01 03:11:19 |
| 180.166.192.66 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-01 03:07:19 |
| 91.232.230.126 | attackspam | DDOS attack |
2019-11-01 02:55:16 |
| 221.2.158.54 | attackspambots | Nov 1 01:49:13 webhost01 sshd[3397]: Failed password for root from 221.2.158.54 port 39410 ssh2 ... |
2019-11-01 03:10:59 |