City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.252.53.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;239.252.53.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:45:26 CST 2025
;; MSG SIZE rcvd: 106
Host 45.53.252.239.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 45.53.252.239.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 18.236.127.140 | attack | Automatic report - XMLRPC Attack |
2019-11-10 07:55:14 |
| 106.13.23.35 | attackspambots | Nov 9 17:44:15 MK-Soft-VM5 sshd[10488]: Failed password for root from 106.13.23.35 port 43050 ssh2 ... |
2019-11-10 07:55:44 |
| 151.45.47.171 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/151.45.47.171/ IT - 1H : (114) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : IT NAME ASN : ASN1267 IP : 151.45.47.171 CIDR : 151.45.0.0/16 PREFIX COUNT : 161 UNIQUE IP COUNT : 6032640 ATTACKS DETECTED ASN1267 : 1H - 2 3H - 2 6H - 3 12H - 8 24H - 14 DateTime : 2019-11-09 17:09:43 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-11-10 07:59:01 |
| 46.38.144.146 | attack | Nov 10 01:16:38 webserver postfix/smtpd\[24625\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 10 01:17:14 webserver postfix/smtpd\[24947\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 10 01:17:52 webserver postfix/smtpd\[24947\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 10 01:18:31 webserver postfix/smtpd\[24947\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 10 01:19:05 webserver postfix/smtpd\[24625\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-10 08:26:30 |
| 182.61.54.14 | attackbotsspam | SSH-BruteForce |
2019-11-10 07:51:40 |
| 192.236.193.31 | attackspambots | Nov 9 17:03:52 mxgate1 postfix/postscreen[22357]: CONNECT from [192.236.193.31]:39833 to [176.31.12.44]:25 Nov 9 17:03:52 mxgate1 postfix/dnsblog[22358]: addr 192.236.193.31 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 9 17:03:52 mxgate1 postfix/postscreen[22357]: PREGREET 33 after 0.11 from [192.236.193.31]:39833: EHLO 02d702a0.ullserverateherps.co Nov 9 17:03:52 mxgate1 postfix/postscreen[22357]: DNSBL rank 2 for [192.236.193.31]:39833 Nov x@x Nov 9 17:03:53 mxgate1 postfix/postscreen[22357]: DISCONNECT [192.236.193.31]:39833 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=192.236.193.31 |
2019-11-10 08:06:05 |
| 176.31.223.179 | attack | Port scan on 5 port(s): 25500 25501 25502 25503 25510 |
2019-11-10 08:13:18 |
| 198.108.67.39 | attack | 11/09/2019-11:09:17.941923 198.108.67.39 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-10 08:12:08 |
| 94.191.40.166 | attack | Nov 10 00:49:31 meumeu sshd[2516]: Failed password for root from 94.191.40.166 port 35788 ssh2 Nov 10 00:54:27 meumeu sshd[3294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.40.166 Nov 10 00:54:28 meumeu sshd[3294]: Failed password for invalid user zinm10 from 94.191.40.166 port 44314 ssh2 ... |
2019-11-10 08:04:19 |
| 62.234.86.83 | attackspambots | 2019-11-09T20:06:01.566447abusebot-5.cloudsearch.cf sshd\[16496\]: Invalid user wangxiongwu520YANGJUAN from 62.234.86.83 port 35963 |
2019-11-10 08:10:19 |
| 49.157.4.111 | attackbotsspam | DATE:2019-11-10 01:12:52, IP:49.157.4.111, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2019-11-10 08:27:41 |
| 116.196.104.100 | attackspam | Nov 9 23:53:17 hcbbdb sshd\[25880\]: Invalid user Asd123!@@ from 116.196.104.100 Nov 9 23:53:17 hcbbdb sshd\[25880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.104.100 Nov 9 23:53:18 hcbbdb sshd\[25880\]: Failed password for invalid user Asd123!@@ from 116.196.104.100 port 39286 ssh2 Nov 9 23:57:53 hcbbdb sshd\[26377\]: Invalid user 123@Admin from 116.196.104.100 Nov 9 23:57:53 hcbbdb sshd\[26377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.104.100 |
2019-11-10 07:58:33 |
| 49.204.76.142 | attackbots | Nov 9 23:56:29 OneL sshd\[31813\]: Invalid user jiang from 49.204.76.142 port 47732 Nov 9 23:56:29 OneL sshd\[31813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.204.76.142 Nov 9 23:56:31 OneL sshd\[31813\]: Failed password for invalid user jiang from 49.204.76.142 port 47732 ssh2 Nov 10 00:00:58 OneL sshd\[31871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.204.76.142 user=root Nov 10 00:01:00 OneL sshd\[31871\]: Failed password for root from 49.204.76.142 port 38477 ssh2 ... |
2019-11-10 08:03:23 |
| 139.217.234.68 | attackspambots | Nov 10 00:07:47 game-panel sshd[6865]: Failed password for root from 139.217.234.68 port 36082 ssh2 Nov 10 00:12:52 game-panel sshd[7102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.234.68 Nov 10 00:12:55 game-panel sshd[7102]: Failed password for invalid user cms from 139.217.234.68 port 48050 ssh2 |
2019-11-10 08:25:19 |
| 206.189.72.217 | attackspambots | Nov 10 01:12:44 vmanager6029 sshd\[11770\]: Invalid user vq from 206.189.72.217 port 57644 Nov 10 01:12:44 vmanager6029 sshd\[11770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.72.217 Nov 10 01:12:46 vmanager6029 sshd\[11770\]: Failed password for invalid user vq from 206.189.72.217 port 57644 ssh2 |
2019-11-10 08:33:30 |