City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.149.134.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;249.149.134.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 15:01:06 CST 2025
;; MSG SIZE rcvd: 107
Host 64.134.149.249.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.134.149.249.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.175.202 | attackbots | Oct 18 00:08:25 rotator sshd\[919\]: Failed password for root from 222.186.175.202 port 42078 ssh2Oct 18 00:08:29 rotator sshd\[919\]: Failed password for root from 222.186.175.202 port 42078 ssh2Oct 18 00:08:33 rotator sshd\[919\]: Failed password for root from 222.186.175.202 port 42078 ssh2Oct 18 00:08:37 rotator sshd\[919\]: Failed password for root from 222.186.175.202 port 42078 ssh2Oct 18 00:08:41 rotator sshd\[919\]: Failed password for root from 222.186.175.202 port 42078 ssh2Oct 18 00:08:51 rotator sshd\[936\]: Failed password for root from 222.186.175.202 port 46962 ssh2 ... |
2019-10-18 06:13:44 |
| 89.36.216.125 | attackspambots | 2019-10-17T22:02:17.635850hub.schaetter.us sshd\[4421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125 user=root 2019-10-17T22:02:18.843749hub.schaetter.us sshd\[4421\]: Failed password for root from 89.36.216.125 port 44640 ssh2 2019-10-17T22:05:58.630416hub.schaetter.us sshd\[4464\]: Invalid user mb from 89.36.216.125 port 55142 2019-10-17T22:05:58.641595hub.schaetter.us sshd\[4464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125 2019-10-17T22:06:01.189196hub.schaetter.us sshd\[4464\]: Failed password for invalid user mb from 89.36.216.125 port 55142 ssh2 ... |
2019-10-18 06:08:46 |
| 201.212.168.67 | attack | Dec 1 17:36:58 odroid64 sshd\[792\]: Invalid user gpadmin from 201.212.168.67 Dec 1 17:36:58 odroid64 sshd\[792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.168.67 Dec 1 17:37:00 odroid64 sshd\[792\]: Failed password for invalid user gpadmin from 201.212.168.67 port 47260 ssh2 Dec 5 10:09:58 odroid64 sshd\[25973\]: Invalid user odoo from 201.212.168.67 Dec 5 10:09:58 odroid64 sshd\[25973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.168.67 Dec 5 10:10:00 odroid64 sshd\[25973\]: Failed password for invalid user odoo from 201.212.168.67 port 34205 ssh2 Dec 8 15:11:12 odroid64 sshd\[2325\]: Invalid user sergey from 201.212.168.67 Dec 8 15:11:12 odroid64 sshd\[2325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.168.67 Dec 8 15:11:14 odroid64 sshd\[2325\]: Failed password for invalid user sergey from 201.212.168.67 p ... |
2019-10-18 06:00:58 |
| 46.38.144.146 | attackbots | v+mailserver-auth-bruteforce |
2019-10-18 06:10:04 |
| 190.145.78.66 | attackspam | Oct 17 11:43:14 wbs sshd\[3132\]: Invalid user rajkot from 190.145.78.66 Oct 17 11:43:14 wbs sshd\[3132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66 Oct 17 11:43:16 wbs sshd\[3132\]: Failed password for invalid user rajkot from 190.145.78.66 port 40904 ssh2 Oct 17 11:47:53 wbs sshd\[3513\]: Invalid user shao from 190.145.78.66 Oct 17 11:47:53 wbs sshd\[3513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.78.66 |
2019-10-18 05:59:54 |
| 222.186.175.150 | attackbotsspam | Oct 17 12:19:25 web1 sshd\[23800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Oct 17 12:19:27 web1 sshd\[23800\]: Failed password for root from 222.186.175.150 port 29964 ssh2 Oct 17 12:19:52 web1 sshd\[23837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Oct 17 12:19:54 web1 sshd\[23837\]: Failed password for root from 222.186.175.150 port 36392 ssh2 Oct 17 12:19:58 web1 sshd\[23837\]: Failed password for root from 222.186.175.150 port 36392 ssh2 |
2019-10-18 06:20:45 |
| 142.44.240.254 | attackspambots | Automatic report - Banned IP Access |
2019-10-18 06:08:25 |
| 134.175.241.163 | attackspam | Oct 17 09:46:51 wbs sshd\[25307\]: Invalid user xlq2922154 from 134.175.241.163 Oct 17 09:46:51 wbs sshd\[25307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.241.163 Oct 17 09:46:53 wbs sshd\[25307\]: Failed password for invalid user xlq2922154 from 134.175.241.163 port 8932 ssh2 Oct 17 09:51:12 wbs sshd\[25726\]: Invalid user gawker from 134.175.241.163 Oct 17 09:51:12 wbs sshd\[25726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.241.163 |
2019-10-18 06:07:05 |
| 2.141.66.247 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.141.66.247/ ES - 1H : (52) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ES NAME ASN : ASN3352 IP : 2.141.66.247 CIDR : 2.141.0.0/16 PREFIX COUNT : 662 UNIQUE IP COUNT : 10540800 WYKRYTE ATAKI Z ASN3352 : 1H - 1 3H - 4 6H - 6 12H - 11 24H - 21 DateTime : 2019-10-17 21:50:43 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-18 06:30:57 |
| 73.15.91.251 | attackspam | 2019-10-17T21:58:31.531587abusebot-4.cloudsearch.cf sshd\[7239\]: Invalid user qwerty from 73.15.91.251 port 59054 |
2019-10-18 06:32:09 |
| 64.88.145.152 | attack | Lines containing failures of 64.88.145.152 Oct 17 21:40:48 server01 postfix/smtpd[4735]: connect from emv13.ilifinousy.com[64.88.145.152] Oct x@x Oct x@x Oct x@x Oct x@x Oct 17 21:40:49 server01 postfix/smtpd[4735]: disconnect from emv13.ilifinousy.com[64.88.145.152] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=64.88.145.152 |
2019-10-18 06:36:17 |
| 201.184.169.106 | attackbots | May 25 11:39:48 odroid64 sshd\[2483\]: Invalid user guest from 201.184.169.106 May 25 11:39:48 odroid64 sshd\[2483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106 May 25 11:39:50 odroid64 sshd\[2483\]: Failed password for invalid user guest from 201.184.169.106 port 36584 ssh2 May 29 12:45:08 odroid64 sshd\[18074\]: Invalid user httpd from 201.184.169.106 May 29 12:45:08 odroid64 sshd\[18074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106 May 29 12:45:10 odroid64 sshd\[18074\]: Failed password for invalid user httpd from 201.184.169.106 port 34057 ssh2 Jun 6 12:01:28 odroid64 sshd\[19612\]: User root from 201.184.169.106 not allowed because not listed in AllowUsers Jun 6 12:01:28 odroid64 sshd\[19612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106 user=root Jun 6 12:01:30 odroid64 sshd\[19612\]: Fai ... |
2019-10-18 06:31:28 |
| 64.17.42.224 | attack | Lines containing failures of 64.17.42.224 Oct 17 21:40:45 server01 postfix/smtpd[4735]: connect from emv31.eistnesieu.com[64.17.42.224] Oct x@x Oct x@x Oct x@x Oct x@x Oct 17 21:40:46 server01 postfix/smtpd[4735]: disconnect from emv31.eistnesieu.com[64.17.42.224] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=64.17.42.224 |
2019-10-18 06:39:35 |
| 201.21.115.162 | attackspam | Nov 29 06:38:41 odroid64 sshd\[20030\]: Invalid user rabbitmq from 201.21.115.162 Nov 29 06:38:41 odroid64 sshd\[20030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.115.162 Nov 29 06:38:43 odroid64 sshd\[20030\]: Failed password for invalid user rabbitmq from 201.21.115.162 port 50755 ssh2 Nov 30 18:20:55 odroid64 sshd\[16629\]: Invalid user storage from 201.21.115.162 Nov 30 18:20:55 odroid64 sshd\[16629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.115.162 Nov 30 18:20:57 odroid64 sshd\[16629\]: Failed password for invalid user storage from 201.21.115.162 port 57648 ssh2 Dec 2 01:04:33 odroid64 sshd\[27105\]: Invalid user midgear from 201.21.115.162 Dec 2 01:04:33 odroid64 sshd\[27105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.21.115.162 Dec 2 01:04:35 odroid64 sshd\[27105\]: Failed password for invalid user midgear fr ... |
2019-10-18 06:06:09 |
| 182.253.71.242 | attackbotsspam | Oct 17 17:59:00 debian sshd\[9600\]: Invalid user mathematics from 182.253.71.242 port 54646 Oct 17 17:59:00 debian sshd\[9600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.71.242 Oct 17 17:59:02 debian sshd\[9600\]: Failed password for invalid user mathematics from 182.253.71.242 port 54646 ssh2 ... |
2019-10-18 06:34:35 |