City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.0.131.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;27.0.131.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:49:05 CST 2025
;; MSG SIZE rcvd: 105
Host 242.131.0.27.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.131.0.27.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.255.64.58 | attack | 51.255.64.58 - - [16/Aug/2020:23:58:54 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.255.64.58 - - [16/Aug/2020:23:58:59 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.255.64.58 - - [16/Aug/2020:23:59:00 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-17 06:39:18 |
| 106.52.152.168 | attackbots | 2020-08-16T20:56:58.706335shield sshd\[28002\]: Invalid user all from 106.52.152.168 port 33994 2020-08-16T20:56:58.714489shield sshd\[28002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.152.168 2020-08-16T20:57:00.667809shield sshd\[28002\]: Failed password for invalid user all from 106.52.152.168 port 33994 ssh2 2020-08-16T20:59:13.749480shield sshd\[28141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.152.168 user=root 2020-08-16T20:59:15.903496shield sshd\[28141\]: Failed password for root from 106.52.152.168 port 59356 ssh2 |
2020-08-17 06:20:00 |
| 213.160.143.146 | attack | Aug 16 18:00:40 george sshd[14769]: Failed password for invalid user kafka from 213.160.143.146 port 36120 ssh2 Aug 16 18:05:04 george sshd[14826]: Invalid user kg from 213.160.143.146 port 44402 Aug 16 18:05:04 george sshd[14826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.160.143.146 Aug 16 18:05:06 george sshd[14826]: Failed password for invalid user kg from 213.160.143.146 port 44402 ssh2 Aug 16 18:09:24 george sshd[15008]: Invalid user nexus from 213.160.143.146 port 52694 ... |
2020-08-17 06:31:59 |
| 85.111.74.140 | attack | Invalid user jx from 85.111.74.140 port 41716 |
2020-08-17 06:25:47 |
| 212.70.149.35 | attack | SASL PLAIN auth failed: ruser=... |
2020-08-17 06:20:52 |
| 51.68.123.192 | attackbots | 2020-08-17T03:49:42.032662hostname sshd[26386]: Invalid user goz from 51.68.123.192 port 39066 2020-08-17T03:49:44.342567hostname sshd[26386]: Failed password for invalid user goz from 51.68.123.192 port 39066 ssh2 2020-08-17T03:53:34.356555hostname sshd[27859]: Invalid user goz from 51.68.123.192 port 45424 ... |
2020-08-17 06:15:59 |
| 66.223.164.237 | attack | SSH Brute-Force. Ports scanning. |
2020-08-17 06:20:19 |
| 134.122.134.228 | attackspambots | (sshd) Failed SSH login from 134.122.134.228 (SG/Singapore/-): 12 in the last 3600 secs |
2020-08-17 06:29:05 |
| 90.189.160.1 | attackspam | Unauthorized connection attempt from IP address 90.189.160.1 on Port 445(SMB) |
2020-08-17 06:38:38 |
| 167.71.102.201 | attackbotsspam | Aug 17 00:23:21 buvik sshd[31830]: Invalid user cjd from 167.71.102.201 Aug 17 00:23:21 buvik sshd[31830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.102.201 Aug 17 00:23:24 buvik sshd[31830]: Failed password for invalid user cjd from 167.71.102.201 port 44530 ssh2 ... |
2020-08-17 06:28:35 |
| 106.12.69.53 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-17 06:40:22 |
| 49.233.180.123 | attackbots | detected by Fail2Ban |
2020-08-17 06:34:34 |
| 123.19.13.187 | attackspam | Unauthorized connection attempt from IP address 123.19.13.187 on Port 445(SMB) |
2020-08-17 06:35:48 |
| 88.132.109.164 | attackspam | Aug 16 14:02:36 dignus sshd[22313]: Failed password for invalid user user from 88.132.109.164 port 58930 ssh2 Aug 16 14:06:15 dignus sshd[22892]: Invalid user render from 88.132.109.164 port 35632 Aug 16 14:06:15 dignus sshd[22892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.132.109.164 Aug 16 14:06:17 dignus sshd[22892]: Failed password for invalid user render from 88.132.109.164 port 35632 ssh2 Aug 16 14:10:08 dignus sshd[23458]: Invalid user eclipse from 88.132.109.164 port 40555 ... |
2020-08-17 06:30:16 |
| 82.208.133.133 | attackspam | Aug 16 22:32:13 sshgateway sshd\[19617\]: Invalid user jp from 82.208.133.133 Aug 16 22:32:13 sshgateway sshd\[19617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.208.133.133 Aug 16 22:32:15 sshgateway sshd\[19617\]: Failed password for invalid user jp from 82.208.133.133 port 52432 ssh2 |
2020-08-17 06:29:44 |