City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2600:1f14:4e4:8c01:fea0:114:2db6:343f
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 48671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2600:1f14:4e4:8c01:fea0:114:2db6:343f. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 03:01:56 CST 2022
;; MSG SIZE rcvd: 66
'
Host f.3.4.3.6.b.d.2.4.1.1.0.0.a.e.f.1.0.c.8.4.e.4.0.4.1.f.1.0.0.6.2.ip6.arpa not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find f.3.4.3.6.b.d.2.4.1.1.0.0.a.e.f.1.0.c.8.4.e.4.0.4.1.f.1.0.0.6.2.ip6.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.119.145.237 | attackspam | $f2bV_matches |
2020-10-06 07:57:38 |
| 196.240.173.95 | attackspam | [N1.H1.VM1] Bad Bot Blocked by UFW |
2020-10-06 08:00:47 |
| 157.92.49.151 | attackbots | Oct 5 23:57:24 db sshd[26802]: User root from 157.92.49.151 not allowed because none of user's groups are listed in AllowGroups ... |
2020-10-06 07:46:37 |
| 94.72.104.249 | attackbotsspam | 20 attempts against mh_ha-misbehave-ban on oak |
2020-10-06 07:45:25 |
| 111.229.244.205 | attack | Bruteforce detected by fail2ban |
2020-10-06 07:45:02 |
| 210.179.249.45 | attackspambots | Oct 5 21:06:39 sshgateway sshd\[21373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.179.249.45 user=root Oct 5 21:06:40 sshgateway sshd\[21373\]: Failed password for root from 210.179.249.45 port 57354 ssh2 Oct 5 21:10:29 sshgateway sshd\[21456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.179.249.45 user=root |
2020-10-06 08:14:00 |
| 49.232.50.87 | attack | Oct 5 12:30:10 localhost sshd\[421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.50.87 user=root Oct 5 12:30:12 localhost sshd\[421\]: Failed password for root from 49.232.50.87 port 40732 ssh2 Oct 5 12:49:30 localhost sshd\[518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.50.87 user=root ... |
2020-10-06 07:49:54 |
| 139.99.121.6 | attackspambots | 139.99.121.6 - - [06/Oct/2020:00:21:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2254 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.99.121.6 - - [06/Oct/2020:00:21:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2257 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.99.121.6 - - [06/Oct/2020:00:21:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2253 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-06 07:56:46 |
| 177.126.130.112 | attackspam | Oct 5 20:39:20 vpn01 sshd[7840]: Failed password for root from 177.126.130.112 port 59372 ssh2 ... |
2020-10-06 08:10:47 |
| 181.10.18.188 | attack | $f2bV_matches |
2020-10-06 08:16:37 |
| 206.189.174.127 | attackspambots | Oct 6 00:06:06 h2646465 sshd[21821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.174.127 user=root Oct 6 00:06:07 h2646465 sshd[21821]: Failed password for root from 206.189.174.127 port 34196 ssh2 Oct 6 00:10:30 h2646465 sshd[22467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.174.127 user=root Oct 6 00:10:32 h2646465 sshd[22467]: Failed password for root from 206.189.174.127 port 43910 ssh2 Oct 6 00:14:30 h2646465 sshd[22585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.174.127 user=root Oct 6 00:14:31 h2646465 sshd[22585]: Failed password for root from 206.189.174.127 port 51726 ssh2 Oct 6 00:18:26 h2646465 sshd[23195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.174.127 user=root Oct 6 00:18:29 h2646465 sshd[23195]: Failed password for root from 206.189.174.127 port 59542 ssh2 Oct 6 00:22 |
2020-10-06 08:06:24 |
| 106.12.127.39 | attackspam | Oct 6 00:16:59 dev0-dcde-rnet sshd[24466]: Failed password for root from 106.12.127.39 port 35302 ssh2 Oct 6 00:22:53 dev0-dcde-rnet sshd[24535]: Failed password for root from 106.12.127.39 port 54790 ssh2 |
2020-10-06 08:01:45 |
| 190.204.254.67 | attack | 1601843849 - 10/04/2020 22:37:29 Host: 190.204.254.67/190.204.254.67 Port: 445 TCP Blocked |
2020-10-06 08:19:47 |
| 140.86.39.162 | attackspambots | Oct 6 00:02:42 *** sshd[29282]: User root from 140.86.39.162 not allowed because not listed in AllowUsers |
2020-10-06 08:15:31 |
| 103.223.9.109 | attack | Threat Management Alert 2: Attempted Information Leak. Signature ET EXPLOIT Netgear DGN Remote Command Execution. From: 103.223.9.109:10961, to: 192.168.31.48:80, protocol: TCP |
2020-10-06 08:08:00 |