City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.4.158.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41091
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;244.4.158.147. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:41:32 CST 2025
;; MSG SIZE rcvd: 106
Host 147.158.4.244.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 147.158.4.244.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 193.70.0.93 | attackspambots | Tried sshing with brute force. |
2019-12-24 09:10:15 |
| 121.34.35.83 | attackspam | 1577141201 - 12/23/2019 23:46:41 Host: 121.34.35.83/121.34.35.83 Port: 445 TCP Blocked |
2019-12-24 08:45:44 |
| 148.70.94.56 | attackbots | Dec 23 08:36:38 scivo sshd[17151]: Invalid user nordmark from 148.70.94.56 Dec 23 08:36:38 scivo sshd[17151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.94.56 Dec 23 08:36:40 scivo sshd[17151]: Failed password for invalid user nordmark from 148.70.94.56 port 46040 ssh2 Dec 23 08:36:41 scivo sshd[17151]: Received disconnect from 148.70.94.56: 11: Bye Bye [preauth] Dec 23 08:46:13 scivo sshd[17733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.94.56 user=r.r Dec 23 08:46:15 scivo sshd[17733]: Failed password for r.r from 148.70.94.56 port 57142 ssh2 Dec 23 08:46:15 scivo sshd[17733]: Received disconnect from 148.70.94.56: 11: Bye Bye [preauth] Dec 23 08:54:14 scivo sshd[18095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.94.56 user=r.r Dec 23 08:54:16 scivo sshd[18095]: Failed password for r.r from 148.70.94.56 port 36........ ------------------------------- |
2019-12-24 09:06:11 |
| 104.168.246.128 | attackspambots | Dec 24 01:36:42 dedicated sshd[18007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.246.128 user=root Dec 24 01:36:45 dedicated sshd[18007]: Failed password for root from 104.168.246.128 port 34672 ssh2 |
2019-12-24 08:51:32 |
| 114.67.95.188 | attack | no |
2019-12-24 08:43:26 |
| 140.143.206.216 | attack | Lines containing failures of 140.143.206.216 Dec 23 23:16:36 nextcloud sshd[19583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.206.216 user=r.r Dec 23 23:16:39 nextcloud sshd[19583]: Failed password for r.r from 140.143.206.216 port 36272 ssh2 Dec 23 23:16:39 nextcloud sshd[19583]: Received disconnect from 140.143.206.216 port 36272:11: Bye Bye [preauth] Dec 23 23:16:39 nextcloud sshd[19583]: Disconnected from authenticating user r.r 140.143.206.216 port 36272 [preauth] Dec 23 23:40:55 nextcloud sshd[28927]: Invalid user shelly from 140.143.206.216 port 46408 Dec 23 23:40:55 nextcloud sshd[28927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.206.216 Dec 23 23:40:56 nextcloud sshd[28927]: Failed password for invalid user shelly from 140.143.206.216 port 46408 ssh2 Dec 23 23:40:57 nextcloud sshd[28927]: Received disconnect from 140.143.206.216 port 46408:11: Bye Bye [pr........ ------------------------------ |
2019-12-24 08:44:18 |
| 106.75.34.41 | attackspambots | Dec 24 00:06:11 hcbbdb sshd\[19478\]: Invalid user vifladt from 106.75.34.41 Dec 24 00:06:11 hcbbdb sshd\[19478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.34.41 Dec 24 00:06:13 hcbbdb sshd\[19478\]: Failed password for invalid user vifladt from 106.75.34.41 port 46416 ssh2 Dec 24 00:12:09 hcbbdb sshd\[20093\]: Invalid user 1234 from 106.75.34.41 Dec 24 00:12:09 hcbbdb sshd\[20093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.34.41 |
2019-12-24 09:08:46 |
| 106.54.196.9 | attackbotsspam | 2019-12-24T01:52:24.354481vps751288.ovh.net sshd\[14656\]: Invalid user jenn from 106.54.196.9 port 53426 2019-12-24T01:52:24.365330vps751288.ovh.net sshd\[14656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.9 2019-12-24T01:52:26.904291vps751288.ovh.net sshd\[14656\]: Failed password for invalid user jenn from 106.54.196.9 port 53426 ssh2 2019-12-24T01:55:14.747578vps751288.ovh.net sshd\[14670\]: Invalid user gentry from 106.54.196.9 port 51058 2019-12-24T01:55:14.756513vps751288.ovh.net sshd\[14670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.9 |
2019-12-24 08:56:49 |
| 117.156.67.18 | attackspambots | Dec 23 14:55:51 web1 sshd\[9297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.156.67.18 user=backup Dec 23 14:55:53 web1 sshd\[9297\]: Failed password for backup from 117.156.67.18 port 2303 ssh2 Dec 23 14:58:59 web1 sshd\[9560\]: Invalid user aik from 117.156.67.18 Dec 23 14:58:59 web1 sshd\[9560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.156.67.18 Dec 23 14:59:01 web1 sshd\[9560\]: Failed password for invalid user aik from 117.156.67.18 port 22799 ssh2 |
2019-12-24 09:05:22 |
| 217.103.68.77 | attackspam | Dec 24 01:34:21 srv206 sshd[7712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-217-103-68-77.ip.prioritytelecom.net user=root Dec 24 01:34:23 srv206 sshd[7712]: Failed password for root from 217.103.68.77 port 39106 ssh2 ... |
2019-12-24 08:48:45 |
| 178.48.248.5 | attack | Lines containing failures of 178.48.248.5 Dec 23 22:24:07 shared10 sshd[15604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.248.5 user=r.r Dec 23 22:24:10 shared10 sshd[15604]: Failed password for r.r from 178.48.248.5 port 54070 ssh2 Dec 23 22:24:10 shared10 sshd[15604]: Received disconnect from 178.48.248.5 port 54070:11: Bye Bye [preauth] Dec 23 22:24:10 shared10 sshd[15604]: Disconnected from authenticating user r.r 178.48.248.5 port 54070 [preauth] Dec 23 22:37:50 shared10 sshd[20580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.248.5 user=r.r Dec 23 22:37:52 shared10 sshd[20580]: Failed password for r.r from 178.48.248.5 port 36302 ssh2 Dec 23 22:37:53 shared10 sshd[20580]: Received disconnect from 178.48.248.5 port 36302:11: Bye Bye [preauth] Dec 23 22:37:53 shared10 sshd[20580]: Disconnected from authenticating user r.r 178.48.248.5 port 36302 [preauth] Dec 23 ........ ------------------------------ |
2019-12-24 09:15:47 |
| 177.47.39.254 | attack | firewall-block, port(s): 2323/tcp |
2019-12-24 09:05:01 |
| 167.99.127.197 | attackbots | Automatic report - XMLRPC Attack |
2019-12-24 09:05:50 |
| 52.58.205.23 | attack | Brute force RDP, port 3389 |
2019-12-24 09:06:38 |
| 217.182.74.125 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-24 09:13:10 |