City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.138.56.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.138.56.219. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:25:19 CST 2025
;; MSG SIZE rcvd: 107
Host 219.56.138.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 219.56.138.253.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 138.186.133.227 | attackspambots | Icarus honeypot on github |
2020-09-27 00:03:27 |
| 64.64.104.10 | attack | Fail2Ban Ban Triggered |
2020-09-26 23:57:37 |
| 5.255.253.138 | attackbotsspam | [Sat Sep 26 03:36:50.928764 2020] [:error] [pid 16537:tid 140694825400064] [client 5.255.253.138:61924] [client 5.255.253.138] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/coreruleset-3.3.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "756"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "X25U4pu7GLUg53phw52smgAAAC0"] ... |
2020-09-27 00:35:37 |
| 61.133.122.19 | attackspam | Invalid user mm from 61.133.122.19 port 33042 |
2020-09-27 00:13:28 |
| 106.12.93.25 | attackspam | 2020-09-26T16:12:48.008601shield sshd\[27120\]: Invalid user kelly from 106.12.93.25 port 55344 2020-09-26T16:12:48.016086shield sshd\[27120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25 2020-09-26T16:12:50.124499shield sshd\[27120\]: Failed password for invalid user kelly from 106.12.93.25 port 55344 ssh2 2020-09-26T16:16:45.373765shield sshd\[28097\]: Invalid user postgres from 106.12.93.25 port 41818 2020-09-26T16:16:45.381610shield sshd\[28097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25 |
2020-09-27 00:40:10 |
| 104.248.147.20 | attackbotsspam | (sshd) Failed SSH login from 104.248.147.20 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 18:16:06 elude sshd[4203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.147.20 user=root Sep 26 18:16:08 elude sshd[4203]: Failed password for root from 104.248.147.20 port 57384 ssh2 Sep 26 18:26:49 elude sshd[5748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.147.20 user=root Sep 26 18:26:50 elude sshd[5748]: Failed password for root from 104.248.147.20 port 41272 ssh2 Sep 26 18:31:17 elude sshd[6387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.147.20 user=root |
2020-09-27 00:38:56 |
| 27.128.168.225 | attack | Invalid user matteo from 27.128.168.225 port 51273 |
2020-09-27 00:34:34 |
| 198.27.124.207 | attackbotsspam | detected by Fail2Ban |
2020-09-27 00:31:53 |
| 134.175.121.80 | attackspam | $f2bV_matches |
2020-09-27 00:09:30 |
| 177.21.16.58 | attack | Sep 24 05:25:59 django sshd[54229]: reveeclipse mapping checking getaddrinfo for 58.16.21.177.teletalk.net.br [177.21.16.58] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 24 05:25:59 django sshd[54229]: Invalid user edgar from 177.21.16.58 Sep 24 05:25:59 django sshd[54229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.21.16.58 Sep 24 05:26:02 django sshd[54229]: Failed password for invalid user edgar from 177.21.16.58 port 43610 ssh2 Sep 24 05:26:02 django sshd[54230]: Received disconnect from 177.21.16.58: 11: Bye Bye Sep 24 05:29:58 django sshd[54555]: reveeclipse mapping checking getaddrinfo for 58.16.21.177.teletalk.net.br [177.21.16.58] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 24 05:29:58 django sshd[54555]: Invalid user ghostname from 177.21.16.58 Sep 24 05:29:58 django sshd[54555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.21.16.58 ........ ----------------------------------------------- https://www.blocklist |
2020-09-27 00:14:36 |
| 45.79.110.218 | attackspambots | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-09-27 00:28:54 |
| 58.217.2.77 | attack | Listed on zen-spamhaus also abuseat.org / proto=6 . srcport=41045 . dstport=23 . (3544) |
2020-09-26 23:58:02 |
| 49.234.99.246 | attack | 2020-09-26T15:13:13.268791abusebot-6.cloudsearch.cf sshd[30780]: Invalid user config from 49.234.99.246 port 39200 2020-09-26T15:13:13.274662abusebot-6.cloudsearch.cf sshd[30780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246 2020-09-26T15:13:13.268791abusebot-6.cloudsearch.cf sshd[30780]: Invalid user config from 49.234.99.246 port 39200 2020-09-26T15:13:14.931706abusebot-6.cloudsearch.cf sshd[30780]: Failed password for invalid user config from 49.234.99.246 port 39200 ssh2 2020-09-26T15:16:58.673067abusebot-6.cloudsearch.cf sshd[30789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246 user=root 2020-09-26T15:17:00.551051abusebot-6.cloudsearch.cf sshd[30789]: Failed password for root from 49.234.99.246 port 48756 ssh2 2020-09-26T15:20:41.764186abusebot-6.cloudsearch.cf sshd[30795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234. ... |
2020-09-27 00:21:06 |
| 128.199.162.108 | attack | 2020-09-26 08:21:33.484151-0500 localhost sshd[37933]: Failed password for invalid user market from 128.199.162.108 port 56006 ssh2 |
2020-09-26 23:59:35 |
| 61.177.172.61 | attackspambots | Sep 26 18:05:26 melroy-server sshd[18781]: Failed password for root from 61.177.172.61 port 43036 ssh2 Sep 26 18:05:32 melroy-server sshd[18781]: Failed password for root from 61.177.172.61 port 43036 ssh2 ... |
2020-09-27 00:16:00 |