City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.65.218.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;245.65.218.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:55:15 CST 2025
;; MSG SIZE rcvd: 107
Host 139.218.65.245.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.218.65.245.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.47.89.157 | attack | Port Scan ... |
2020-07-26 22:10:22 |
| 200.170.213.74 | attack | Jul 26 14:33:10 vmd36147 sshd[14356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.213.74 Jul 26 14:33:12 vmd36147 sshd[14356]: Failed password for invalid user speech from 200.170.213.74 port 54482 ssh2 ... |
2020-07-26 21:52:02 |
| 195.245.70.230 | attackbotsspam | Unauthorized connection attempt from IP address 195.245.70.230 on Port 445(SMB) |
2020-07-26 21:55:18 |
| 64.91.246.36 | attack | (sshd) Failed SSH login from 64.91.246.36 (US/United States/host.nuheara.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 26 14:03:01 amsweb01 sshd[29165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.91.246.36 user=root Jul 26 14:03:03 amsweb01 sshd[29165]: Failed password for root from 64.91.246.36 port 44644 ssh2 Jul 26 14:04:41 amsweb01 sshd[29421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.91.246.36 user=root Jul 26 14:04:43 amsweb01 sshd[29421]: Failed password for root from 64.91.246.36 port 49086 ssh2 Jul 26 14:06:18 amsweb01 sshd[29673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.91.246.36 user=root |
2020-07-26 21:54:52 |
| 116.196.94.211 | attack | 2020-07-26T14:06:23+0200 Failed SSH Authentication/Brute Force Attack. (Server 10) |
2020-07-26 21:51:03 |
| 194.44.38.51 | attack | Automatic report - Banned IP Access |
2020-07-26 22:02:59 |
| 45.129.181.124 | attackbotsspam | Jul 26 15:26:11 santamaria sshd\[23063\]: Invalid user admin from 45.129.181.124 Jul 26 15:26:11 santamaria sshd\[23063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.129.181.124 Jul 26 15:26:13 santamaria sshd\[23063\]: Failed password for invalid user admin from 45.129.181.124 port 37984 ssh2 ... |
2020-07-26 22:16:12 |
| 37.28.157.162 | attackbots | 37.28.157.162 - - [26/Jul/2020:14:13:24 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.28.157.162 - - [26/Jul/2020:14:13:25 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.28.157.162 - - [26/Jul/2020:14:13:26 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-07-26 22:24:26 |
| 94.79.55.192 | attack | Jul 26 14:02:01 plex-server sshd[3400534]: Invalid user git_user from 94.79.55.192 port 59292 Jul 26 14:02:01 plex-server sshd[3400534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.79.55.192 Jul 26 14:02:01 plex-server sshd[3400534]: Invalid user git_user from 94.79.55.192 port 59292 Jul 26 14:02:03 plex-server sshd[3400534]: Failed password for invalid user git_user from 94.79.55.192 port 59292 ssh2 Jul 26 14:06:03 plex-server sshd[3403583]: Invalid user dcg from 94.79.55.192 port 35222 ... |
2020-07-26 22:14:14 |
| 188.165.169.238 | attack | SSH Brute Force |
2020-07-26 22:21:47 |
| 222.186.180.223 | attackspambots | Jul 26 06:38:52 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2 Jul 26 06:38:56 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2 Jul 26 06:38:58 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2 Jul 26 06:39:02 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2 Jul 26 06:39:07 dignus sshd[17084]: Failed password for root from 222.186.180.223 port 22442 ssh2 ... |
2020-07-26 21:43:13 |
| 164.90.223.8 | attack | 2020-07-26T14:05:53.861504galaxy.wi.uni-potsdam.de sshd[29779]: Failed password for invalid user admin from 164.90.223.8 port 53348 ssh2 2020-07-26T14:05:54.141850galaxy.wi.uni-potsdam.de sshd[29784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.223.8 user=root 2020-07-26T14:05:56.536979galaxy.wi.uni-potsdam.de sshd[29784]: Failed password for root from 164.90.223.8 port 56370 ssh2 2020-07-26T14:05:56.763771galaxy.wi.uni-potsdam.de sshd[29788]: Invalid user 1234 from 164.90.223.8 port 59914 2020-07-26T14:05:56.768801galaxy.wi.uni-potsdam.de sshd[29788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.223.8 2020-07-26T14:05:56.763771galaxy.wi.uni-potsdam.de sshd[29788]: Invalid user 1234 from 164.90.223.8 port 59914 2020-07-26T14:05:59.103155galaxy.wi.uni-potsdam.de sshd[29788]: Failed password for invalid user 1234 from 164.90.223.8 port 59914 ssh2 2020-07-26T14:05:59.329708galaxy.wi.uni-p ... |
2020-07-26 22:22:33 |
| 111.67.200.161 | attackbotsspam | Jul 26 13:48:05 roki sshd[29344]: Invalid user gala from 111.67.200.161 Jul 26 13:48:05 roki sshd[29344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.200.161 Jul 26 13:48:07 roki sshd[29344]: Failed password for invalid user gala from 111.67.200.161 port 58590 ssh2 Jul 26 14:06:04 roki sshd[30514]: Invalid user dockeruser from 111.67.200.161 Jul 26 14:06:04 roki sshd[30514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.200.161 ... |
2020-07-26 22:12:16 |
| 221.156.126.1 | attackspam | Failed password for invalid user devor from 221.156.126.1 port 35678 ssh2 |
2020-07-26 22:20:02 |
| 79.178.60.203 | attackbotsspam | TCP Port Scanning |
2020-07-26 22:01:58 |