City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.59.49.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;245.59.49.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:27:16 CST 2025
;; MSG SIZE rcvd: 106
Host 149.49.59.245.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.49.59.245.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 202.152.24.234 | attackbots | 10/12/2019-10:16:32.355503 202.152.24.234 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-12 23:15:02 |
| 183.131.82.99 | attackspam | $f2bV_matches |
2019-10-12 22:35:00 |
| 91.214.130.253 | attackbotsspam | 2019-10-12 09:16:23 H=(host-91.214.130.253.ardinvest.net) [91.214.130.253]:54943 I=[192.147.25.65]:25 F= |
2019-10-12 23:19:50 |
| 213.32.67.45 | attackspambots | xmlrpc attack |
2019-10-12 23:12:40 |
| 222.171.82.169 | attackspam | Oct 12 04:31:00 friendsofhawaii sshd\[9581\]: Invalid user Sport2017 from 222.171.82.169 Oct 12 04:31:00 friendsofhawaii sshd\[9581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.171.82.169 Oct 12 04:31:02 friendsofhawaii sshd\[9581\]: Failed password for invalid user Sport2017 from 222.171.82.169 port 60114 ssh2 Oct 12 04:38:06 friendsofhawaii sshd\[10174\]: Invalid user PASSW0RD@2019 from 222.171.82.169 Oct 12 04:38:06 friendsofhawaii sshd\[10174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.171.82.169 |
2019-10-12 22:46:01 |
| 182.61.188.40 | attackspam | Oct 12 16:31:17 OPSO sshd\[15646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.188.40 user=root Oct 12 16:31:19 OPSO sshd\[15646\]: Failed password for root from 182.61.188.40 port 45338 ssh2 Oct 12 16:35:47 OPSO sshd\[16561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.188.40 user=root Oct 12 16:35:50 OPSO sshd\[16561\]: Failed password for root from 182.61.188.40 port 57278 ssh2 Oct 12 16:40:17 OPSO sshd\[17304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.188.40 user=root |
2019-10-12 22:44:29 |
| 103.36.84.100 | attackbots | Oct 12 11:12:20 firewall sshd[20376]: Invalid user Gym@123 from 103.36.84.100 Oct 12 11:12:21 firewall sshd[20376]: Failed password for invalid user Gym@123 from 103.36.84.100 port 46778 ssh2 Oct 12 11:16:53 firewall sshd[20490]: Invalid user Projekt123 from 103.36.84.100 ... |
2019-10-12 23:01:44 |
| 51.68.122.216 | attackspambots | Oct 12 16:13:18 SilenceServices sshd[13047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.216 Oct 12 16:13:20 SilenceServices sshd[13047]: Failed password for invalid user 123Cheese from 51.68.122.216 port 56890 ssh2 Oct 12 16:17:21 SilenceServices sshd[14116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.216 |
2019-10-12 22:37:31 |
| 222.186.30.165 | attackbots | Oct 12 16:28:49 debian64 sshd\[12798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165 user=root Oct 12 16:28:51 debian64 sshd\[12798\]: Failed password for root from 222.186.30.165 port 64914 ssh2 Oct 12 16:28:53 debian64 sshd\[12798\]: Failed password for root from 222.186.30.165 port 64914 ssh2 ... |
2019-10-12 22:30:16 |
| 92.222.216.81 | attackspam | Oct 12 16:56:15 SilenceServices sshd[24396]: Failed password for root from 92.222.216.81 port 56012 ssh2 Oct 12 17:00:05 SilenceServices sshd[25413]: Failed password for root from 92.222.216.81 port 47063 ssh2 |
2019-10-12 23:19:32 |
| 106.51.98.159 | attack | Oct 12 04:50:04 friendsofhawaii sshd\[11307\]: Invalid user Willkommen_123 from 106.51.98.159 Oct 12 04:50:04 friendsofhawaii sshd\[11307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.98.159 Oct 12 04:50:06 friendsofhawaii sshd\[11307\]: Failed password for invalid user Willkommen_123 from 106.51.98.159 port 40052 ssh2 Oct 12 04:55:00 friendsofhawaii sshd\[12068\]: Invalid user Root@2015 from 106.51.98.159 Oct 12 04:55:00 friendsofhawaii sshd\[12068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.98.159 |
2019-10-12 23:09:05 |
| 220.134.146.84 | attackbotsspam | Oct 12 16:11:43 h2177944 sshd\[453\]: Invalid user 123Staff from 220.134.146.84 port 52234 Oct 12 16:11:43 h2177944 sshd\[453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.146.84 Oct 12 16:11:45 h2177944 sshd\[453\]: Failed password for invalid user 123Staff from 220.134.146.84 port 52234 ssh2 Oct 12 16:16:26 h2177944 sshd\[563\]: Invalid user Transport-123 from 220.134.146.84 port 34748 Oct 12 16:16:26 h2177944 sshd\[563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.146.84 ... |
2019-10-12 23:18:37 |
| 191.235.93.236 | attackbotsspam | Oct 12 17:56:39 server sshd\[28609\]: User root from 191.235.93.236 not allowed because listed in DenyUsers Oct 12 17:56:39 server sshd\[28609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.93.236 user=root Oct 12 17:56:41 server sshd\[28609\]: Failed password for invalid user root from 191.235.93.236 port 52088 ssh2 Oct 12 18:01:40 server sshd\[4891\]: User root from 191.235.93.236 not allowed because listed in DenyUsers Oct 12 18:01:40 server sshd\[4891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.93.236 user=root |
2019-10-12 23:13:03 |
| 185.254.188.213 | attack | proto=tcp . spt=40123 . dpt=3389 . src=185.254.188.213 . dst=xx.xx.4.1 . (Listed on rbldns-ru) (899) |
2019-10-12 23:16:11 |
| 212.47.235.193 | attack | scan r |
2019-10-12 22:57:12 |