City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.16.67.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;239.16.67.16. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:31:59 CST 2025
;; MSG SIZE rcvd: 105
Host 16.67.16.239.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 16.67.16.239.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.175.167 | attack | Nov 12 10:07:56 meumeu sshd[12720]: Failed password for root from 222.186.175.167 port 63178 ssh2 Nov 12 10:08:00 meumeu sshd[12720]: Failed password for root from 222.186.175.167 port 63178 ssh2 Nov 12 10:08:03 meumeu sshd[12720]: Failed password for root from 222.186.175.167 port 63178 ssh2 Nov 12 10:08:08 meumeu sshd[12720]: Failed password for root from 222.186.175.167 port 63178 ssh2 ... |
2019-11-12 17:14:49 |
| 51.75.52.127 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 43 - port: 8101 proto: TCP cat: Misc Attack |
2019-11-12 16:59:02 |
| 213.251.35.49 | attack | Nov 12 12:06:28 server sshd\[18066\]: Invalid user borba from 213.251.35.49 Nov 12 12:06:28 server sshd\[18066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.35.49 Nov 12 12:06:30 server sshd\[18066\]: Failed password for invalid user borba from 213.251.35.49 port 40362 ssh2 Nov 12 12:12:58 server sshd\[19650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.35.49 user=root Nov 12 12:13:00 server sshd\[19650\]: Failed password for root from 213.251.35.49 port 46898 ssh2 ... |
2019-11-12 17:28:12 |
| 54.36.214.76 | attackspam | 2019-11-12T10:07:35.249779mail01 postfix/smtpd[5987]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-12T10:08:09.360685mail01 postfix/smtpd[5987]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-12T10:08:54.102551mail01 postfix/smtpd[5987]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-12T10:08:54.102961mail01 postfix/smtpd[24832]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-12 17:32:03 |
| 203.82.42.90 | attack | Nov 12 07:20:33 ns382633 sshd\[10255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.82.42.90 user=root Nov 12 07:20:35 ns382633 sshd\[10255\]: Failed password for root from 203.82.42.90 port 52436 ssh2 Nov 12 07:24:54 ns382633 sshd\[10663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.82.42.90 user=root Nov 12 07:24:56 ns382633 sshd\[10663\]: Failed password for root from 203.82.42.90 port 34480 ssh2 Nov 12 07:28:52 ns382633 sshd\[11462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.82.42.90 user=root |
2019-11-12 17:17:06 |
| 52.177.202.136 | attack | Wordpress Admin Login attack |
2019-11-12 17:10:46 |
| 5.196.29.194 | attack | Nov 12 07:25:02 SilenceServices sshd[6825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.29.194 Nov 12 07:25:04 SilenceServices sshd[6825]: Failed password for invalid user teste from 5.196.29.194 port 55660 ssh2 Nov 12 07:29:09 SilenceServices sshd[8037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.29.194 |
2019-11-12 17:08:12 |
| 156.67.222.12 | attackbots | miraklein.com 156.67.222.12 \[12/Nov/2019:07:28:26 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 439 "-" "WordPress/4.8.8\;" miraniessen.de 156.67.222.12 \[12/Nov/2019:07:28:28 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4213 "-" "WordPress/4.8.8\;" |
2019-11-12 17:34:29 |
| 202.141.230.30 | attack | Nov 12 11:26:43 sauna sshd[152999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.141.230.30 Nov 12 11:26:45 sauna sshd[152999]: Failed password for invalid user 7777777 from 202.141.230.30 port 40072 ssh2 ... |
2019-11-12 17:33:42 |
| 73.95.35.149 | attackbots | Nov 12 08:53:17 zeus sshd[1694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.95.35.149 Nov 12 08:53:19 zeus sshd[1694]: Failed password for invalid user verollet from 73.95.35.149 port 34781 ssh2 Nov 12 08:57:35 zeus sshd[1771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.95.35.149 Nov 12 08:57:37 zeus sshd[1771]: Failed password for invalid user ubnt from 73.95.35.149 port 43858 ssh2 |
2019-11-12 17:38:31 |
| 186.153.138.2 | attackbotsspam | Nov 12 10:04:08 lnxweb61 sshd[20026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.153.138.2 |
2019-11-12 17:31:04 |
| 175.106.38.51 | attackspam | Nov 12 07:22:43 mxgate1 postfix/postscreen[24898]: CONNECT from [175.106.38.51]:53600 to [176.31.12.44]:25 Nov 12 07:22:43 mxgate1 postfix/dnsblog[24915]: addr 175.106.38.51 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 12 07:22:43 mxgate1 postfix/dnsblog[25010]: addr 175.106.38.51 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 12 07:22:43 mxgate1 postfix/dnsblog[25010]: addr 175.106.38.51 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 12 07:22:43 mxgate1 postfix/dnsblog[24918]: addr 175.106.38.51 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 12 07:22:43 mxgate1 postfix/postscreen[24898]: PREGREET 22 after 0.25 from [175.106.38.51]:53600: EHLO [175.106.38.51] Nov 12 07:22:44 mxgate1 postfix/postscreen[24898]: DNSBL rank 4 for [175.106.38.51]:53600 Nov x@x Nov 12 07:22:47 mxgate1 postfix/postscreen[24898]: HANGUP after 2.8 from [175.106.38.51]:53600 in tests after SMTP handshake Nov 12 07:22:47 mxgate1 postfix/postscreen[24898]: DISCONNECT [175.1........ ------------------------------- |
2019-11-12 17:37:19 |
| 193.32.163.123 | attackspam | Nov 12 14:26:20 itv-usvr-01 sshd[11431]: Invalid user admin from 193.32.163.123 |
2019-11-12 17:15:15 |
| 68.168.132.49 | attackspambots | Nov 11 16:39:51 kmh-mb-001 sshd[26648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.132.49 user=r.r Nov 11 16:39:53 kmh-mb-001 sshd[26648]: Failed password for r.r from 68.168.132.49 port 59020 ssh2 Nov 11 16:39:54 kmh-mb-001 sshd[26648]: Received disconnect from 68.168.132.49 port 59020:11: Bye Bye [preauth] Nov 11 16:39:54 kmh-mb-001 sshd[26648]: Disconnected from 68.168.132.49 port 59020 [preauth] Nov 11 16:52:37 kmh-mb-001 sshd[27058]: Invalid user 123 from 68.168.132.49 port 33542 Nov 11 16:52:37 kmh-mb-001 sshd[27058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.132.49 Nov 11 16:52:40 kmh-mb-001 sshd[27058]: Failed password for invalid user 123 from 68.168.132.49 port 33542 ssh2 Nov 11 16:52:40 kmh-mb-001 sshd[27058]: Received disconnect from 68.168.132.49 port 33542:11: Bye Bye [preauth] Nov 11 16:52:40 kmh-mb-001 sshd[27058]: Disconnected from 68.168.132.49 por........ ------------------------------- |
2019-11-12 17:20:25 |
| 41.60.232.101 | attackspam | Autoban 41.60.232.101 AUTH/CONNECT |
2019-11-12 17:28:58 |