City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.122.122.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;243.122.122.245. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:46:24 CST 2025
;; MSG SIZE rcvd: 108
Host 245.122.122.243.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 245.122.122.243.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 191.252.222.69 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-10-11 13:50:35 |
| 139.162.147.137 | attackspambots | Use Brute-Force |
2020-10-11 14:17:25 |
| 84.2.226.70 | attack | Invalid user info2 from 84.2.226.70 port 32794 |
2020-10-11 13:52:03 |
| 167.172.38.238 | attack | Oct 11 07:42:49 lavrea sshd[286404]: Invalid user test from 167.172.38.238 port 36018 ... |
2020-10-11 13:59:03 |
| 221.120.163.94 | attack | 2020-10-11T01:40:24.789264sorsha.thespaminator.com sshd[16043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.163.94 user=root 2020-10-11T01:40:26.743091sorsha.thespaminator.com sshd[16043]: Failed password for root from 221.120.163.94 port 2402 ssh2 ... |
2020-10-11 14:09:02 |
| 106.12.89.154 | attack | Invalid user test from 106.12.89.154 port 55030 |
2020-10-11 13:52:36 |
| 66.70.142.231 | attack | Oct 11 01:08:11 buvik sshd[32233]: Failed password for invalid user install from 66.70.142.231 port 55348 ssh2 Oct 11 01:13:24 buvik sshd[642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.142.231 user=root Oct 11 01:13:26 buvik sshd[642]: Failed password for root from 66.70.142.231 port 60488 ssh2 ... |
2020-10-11 13:48:58 |
| 5.8.10.202 | attack |
|
2020-10-11 13:41:22 |
| 154.127.32.116 | attackbotsspam | 154.127.32.116 (BJ/Benin/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 11 01:46:32 server2 sshd[11944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.127.32.116 user=root Oct 11 01:46:34 server2 sshd[11944]: Failed password for root from 154.127.32.116 port 57854 ssh2 Oct 11 01:44:13 server2 sshd[10788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92 user=root Oct 11 01:44:15 server2 sshd[10788]: Failed password for root from 121.241.244.92 port 41628 ssh2 Oct 11 01:47:41 server2 sshd[12513]: Failed password for root from 35.226.132.241 port 34668 ssh2 Oct 11 01:45:09 server2 sshd[10876]: Failed password for root from 15.207.188.39 port 33646 ssh2 IP Addresses Blocked: |
2020-10-11 13:48:27 |
| 67.227.214.73 | attack | [Sat Oct 10 22:47:55.141880 2020] [access_compat:error] [pid 4855] [client 67.227.214.73:49196] AH01797: client denied by server configuration: /var/www/plzenskypruvodce.cz/www/xmlrpc.php [Sat Oct 10 22:47:55.253684 2020] [access_compat:error] [pid 4857] [client 67.227.214.73:49204] AH01797: client denied by server configuration: /var/www/plzenskypruvodce.cz/www/xmlrpc.php ... |
2020-10-11 14:15:14 |
| 182.61.2.135 | attackspambots | Automatic report - Banned IP Access |
2020-10-11 13:42:03 |
| 69.55.49.187 | attack | Oct 11 06:38:23 vpn01 sshd[8807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.49.187 Oct 11 06:38:25 vpn01 sshd[8807]: Failed password for invalid user git from 69.55.49.187 port 49832 ssh2 ... |
2020-10-11 13:51:18 |
| 118.97.213.194 | attackbotsspam | Repeated brute force against a port |
2020-10-11 14:12:49 |
| 106.13.144.207 | attackbotsspam | "fail2ban match" |
2020-10-11 14:04:12 |
| 128.199.182.170 | attackspam | 2020-10-11T01:40:28.099057shield sshd\[31024\]: Invalid user Jhannelle from 128.199.182.170 port 37122 2020-10-11T01:40:28.106013shield sshd\[31024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.170 2020-10-11T01:40:30.072070shield sshd\[31024\]: Failed password for invalid user Jhannelle from 128.199.182.170 port 37122 ssh2 2020-10-11T01:41:30.367236shield sshd\[31093\]: Invalid user Jessa from 128.199.182.170 port 62538 2020-10-11T01:41:30.376771shield sshd\[31093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.170 |
2020-10-11 13:42:21 |