City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.25.159.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;245.25.159.45. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:31:53 CST 2025
;; MSG SIZE rcvd: 106
Host 45.159.25.245.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 45.159.25.245.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 134.175.165.186 | attack | Oct 6 03:02:27 itv-usvr-02 sshd[1585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.165.186 user=root Oct 6 03:07:00 itv-usvr-02 sshd[1747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.165.186 user=root Oct 6 03:11:34 itv-usvr-02 sshd[1991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.165.186 user=root |
2020-10-06 04:40:33 |
| 62.4.55.67 | attack | Automatic report - Banned IP Access |
2020-10-06 04:23:59 |
| 173.236.146.172 | attackspam | 2020/10/05 21:39:00 [error] 8462#8462: *385948 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 173.236.146.172, server: _, request: "GET /wp-login.php HTTP/1.1", host: "kettler-textilkonfektion.de" 2020/10/05 21:47:13 [error] 8462#8462: *387406 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 173.236.146.172, server: _, request: "GET /wp-login.php HTTP/1.1", host: "srvfarm.com" |
2020-10-06 04:06:52 |
| 206.189.142.144 | attackspam | 2020-10-04T20:19:40.164581git sshd[52848]: Unable to negotiate with 206.189.142.144 port 58508: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2020-10-04T20:22:40.678999git sshd[52859]: Connection from 206.189.142.144 port 40310 on 138.197.214.51 port 22 rdomain "" 2020-10-04T20:22:40.903511git sshd[52859]: Unable to negotiate with 206.189.142.144 port 40310: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2020-10-04T20:25:45.496633git sshd[52877]: Connection from 206.189.142.144 port 50340 on 138.197.214.51 port 22 rdomain "" 2020-10-04T20:25:45.719524git sshd[52877]: Unable to negotiate with 206.189.142.144 port 50340: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2020-10-04 ... |
2020-10-06 04:24:39 |
| 71.95.252.231 | attackbotsspam | DATE:2020-10-05 12:21:14, IP:71.95.252.231, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2020-10-06 04:32:44 |
| 175.198.80.24 | attack | Brute-force attempt banned |
2020-10-06 04:25:13 |
| 222.186.31.83 | attack | Oct 5 22:54:11 server2 sshd\[3875\]: User root from 222.186.31.83 not allowed because not listed in AllowUsers Oct 5 22:54:11 server2 sshd\[3877\]: User root from 222.186.31.83 not allowed because not listed in AllowUsers Oct 5 22:55:21 server2 sshd\[4085\]: User root from 222.186.31.83 not allowed because not listed in AllowUsers Oct 5 22:55:51 server2 sshd\[4091\]: User root from 222.186.31.83 not allowed because not listed in AllowUsers Oct 5 23:03:31 server2 sshd\[4660\]: User root from 222.186.31.83 not allowed because not listed in AllowUsers Oct 5 23:03:32 server2 sshd\[4662\]: User root from 222.186.31.83 not allowed because not listed in AllowUsers |
2020-10-06 04:08:35 |
| 104.206.128.2 | attackspambots |
|
2020-10-06 04:10:28 |
| 49.235.221.66 | attackbotsspam | 2020-10-05T08:13:58.953538morrigan.ad5gb.com sshd[1391257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.221.66 user=root 2020-10-05T08:14:00.621679morrigan.ad5gb.com sshd[1391257]: Failed password for root from 49.235.221.66 port 38418 ssh2 |
2020-10-06 04:23:13 |
| 119.96.158.238 | attack | Port scan denied |
2020-10-06 04:17:02 |
| 104.143.38.34 | attackspambots | SP-Scan 52485:1433 detected 2020.10.04 16:15:56 blocked until 2020.11.23 08:18:43 |
2020-10-06 04:29:46 |
| 112.85.42.184 | attack | Oct 5 22:13:39 db sshd[22411]: User root from 112.85.42.184 not allowed because none of user's groups are listed in AllowGroups ... |
2020-10-06 04:22:30 |
| 192.241.195.30 | attack | 192.241.195.30 - - [05/Oct/2020:10:39:37 +0100] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.241.195.30 - - [05/Oct/2020:10:39:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2231 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 192.241.195.30 - - [05/Oct/2020:10:39:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-06 04:40:00 |
| 112.85.42.85 | attackspambots | Oct 5 22:34:49 vps1 sshd[20659]: Failed none for invalid user root from 112.85.42.85 port 18258 ssh2 Oct 5 22:34:49 vps1 sshd[20659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.85 user=root Oct 5 22:34:52 vps1 sshd[20659]: Failed password for invalid user root from 112.85.42.85 port 18258 ssh2 Oct 5 22:34:57 vps1 sshd[20659]: Failed password for invalid user root from 112.85.42.85 port 18258 ssh2 Oct 5 22:35:03 vps1 sshd[20659]: Failed password for invalid user root from 112.85.42.85 port 18258 ssh2 Oct 5 22:35:08 vps1 sshd[20659]: Failed password for invalid user root from 112.85.42.85 port 18258 ssh2 Oct 5 22:35:14 vps1 sshd[20659]: Failed password for invalid user root from 112.85.42.85 port 18258 ssh2 Oct 5 22:35:16 vps1 sshd[20659]: error: maximum authentication attempts exceeded for invalid user root from 112.85.42.85 port 18258 ssh2 [preauth] ... |
2020-10-06 04:38:16 |
| 103.28.32.18 | attackbotsspam | Oct 5 21:27:32 rocket sshd[5742]: Failed password for root from 103.28.32.18 port 58304 ssh2 Oct 5 21:33:37 rocket sshd[6503]: Failed password for root from 103.28.32.18 port 58238 ssh2 ... |
2020-10-06 04:36:22 |