City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.121.38.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.121.38.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:16:33 CST 2025
;; MSG SIZE rcvd: 107
Host 168.38.121.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 168.38.121.253.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 129.250.206.86 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-10-25 04:54:08 |
| 79.137.73.253 | attackbotsspam | 2019-10-24T20:17:33.260597homeassistant sshd[8970]: Invalid user davide from 79.137.73.253 port 39832 2019-10-24T20:17:33.267181homeassistant sshd[8970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.73.253 ... |
2019-10-25 04:37:13 |
| 202.51.74.189 | attackbotsspam | Oct 24 20:17:03 anodpoucpklekan sshd[31970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189 user=root Oct 24 20:17:05 anodpoucpklekan sshd[31970]: Failed password for root from 202.51.74.189 port 35586 ssh2 ... |
2019-10-25 04:56:19 |
| 61.147.247.36 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/61.147.247.36/ CN - 1H : (911) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 61.147.247.36 CIDR : 61.147.240.0/20 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 ATTACKS DETECTED ASN4134 : 1H - 5 3H - 29 6H - 58 12H - 143 24H - 293 DateTime : 2019-10-24 22:17:20 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-10-25 04:44:57 |
| 185.234.219.81 | attackspambots | 2019-10-24 dovecot_login authenticator failed for \(**REMOVED**.org\) \[185.234.219.81\]: 535 Incorrect authentication data \(set_id=test@**REMOVED**.org\) 2019-10-24 dovecot_login authenticator failed for \(**REMOVED**.org\) \[185.234.219.81\]: 535 Incorrect authentication data \(set_id=info@**REMOVED**.org\) 2019-10-24 dovecot_login authenticator failed for \(**REMOVED**.org\) \[185.234.219.81\]: 535 Incorrect authentication data \(set_id=admin@**REMOVED**.org\) |
2019-10-25 04:50:33 |
| 110.42.4.62 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/110.42.4.62/ CN - 1H : (911) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN136188 IP : 110.42.4.62 CIDR : 110.42.0.0/18 PREFIX COUNT : 87 UNIQUE IP COUNT : 143104 ATTACKS DETECTED ASN136188 : 1H - 6 3H - 9 6H - 9 12H - 9 24H - 9 DateTime : 2019-10-24 22:17:20 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-10-25 04:42:54 |
| 89.216.49.25 | attackbots | proto=tcp . spt=54277 . dpt=25 . (Found on Dark List de Oct 24) (762) |
2019-10-25 04:56:35 |
| 106.75.64.239 | attack | 2019-10-24T20:17:24.657298abusebot-5.cloudsearch.cf sshd\[25445\]: Invalid user fuckyou from 106.75.64.239 port 57220 |
2019-10-25 04:40:25 |
| 222.186.42.4 | attack | Oct 25 03:49:06 webhost01 sshd[9871]: Failed password for root from 222.186.42.4 port 61544 ssh2 Oct 25 03:49:24 webhost01 sshd[9871]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 61544 ssh2 [preauth] ... |
2019-10-25 04:57:12 |
| 118.24.246.193 | attackspambots | Oct 24 23:34:36 sauna sshd[206838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.246.193 Oct 24 23:34:38 sauna sshd[206838]: Failed password for invalid user com from 118.24.246.193 port 58758 ssh2 ... |
2019-10-25 04:45:21 |
| 46.38.144.57 | attackspambots | Oct 24 22:28:36 webserver postfix/smtpd\[2615\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 22:29:47 webserver postfix/smtpd\[2615\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 22:30:54 webserver postfix/smtpd\[2615\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 22:32:08 webserver postfix/smtpd\[2615\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 22:33:19 webserver postfix/smtpd\[3488\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-10-25 04:33:02 |
| 62.210.103.172 | attack | Automatic report - Port Scan Attack |
2019-10-25 04:23:28 |
| 79.157.217.179 | attackbotsspam | Oct 24 10:13:10 php1 sshd\[19826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.red-79-157-217.dynamicip.rima-tde.net user=root Oct 24 10:13:12 php1 sshd\[19826\]: Failed password for root from 79.157.217.179 port 59244 ssh2 Oct 24 10:17:35 php1 sshd\[20335\]: Invalid user com from 79.157.217.179 Oct 24 10:17:35 php1 sshd\[20335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.red-79-157-217.dynamicip.rima-tde.net Oct 24 10:17:36 php1 sshd\[20335\]: Failed password for invalid user com from 79.157.217.179 port 52078 ssh2 |
2019-10-25 04:34:51 |
| 193.32.163.182 | attack | Oct 24 22:17:45 fr01 sshd[27346]: Invalid user admin from 193.32.163.182 ... |
2019-10-25 04:30:43 |
| 52.34.243.47 | attack | 10/24/2019-22:17:12.485179 52.34.243.47 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-10-25 04:52:35 |