City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.149.107.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.149.107.5. IN A
;; AUTHORITY SECTION:
. 279 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:31:00 CST 2023
;; MSG SIZE rcvd: 105
5.107.149.44.in-addr.arpa domain name pointer dhcp-44-149-107-5.db0hsn.as64646.de.ampr.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.107.149.44.in-addr.arpa name = dhcp-44-149-107-5.db0hsn.as64646.de.ampr.org.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 120.92.80.120 | attack | Jun 24 14:07:50 electroncash sshd[39309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120 Jun 24 14:07:50 electroncash sshd[39309]: Invalid user sonos from 120.92.80.120 port 10315 Jun 24 14:07:52 electroncash sshd[39309]: Failed password for invalid user sonos from 120.92.80.120 port 10315 ssh2 Jun 24 14:09:54 electroncash sshd[39846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.80.120 user=root Jun 24 14:09:55 electroncash sshd[39846]: Failed password for root from 120.92.80.120 port 20022 ssh2 ... |
2020-06-24 20:23:08 |
| 89.34.27.48 | attack | Automatic report - Banned IP Access |
2020-06-24 20:14:06 |
| 13.68.171.41 | attack | Jun 24 10:36:23 inter-technics sshd[7596]: Invalid user weblogic from 13.68.171.41 port 58648 Jun 24 10:36:23 inter-technics sshd[7596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.171.41 Jun 24 10:36:23 inter-technics sshd[7596]: Invalid user weblogic from 13.68.171.41 port 58648 Jun 24 10:36:25 inter-technics sshd[7596]: Failed password for invalid user weblogic from 13.68.171.41 port 58648 ssh2 Jun 24 10:37:42 inter-technics sshd[7715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.171.41 user=root Jun 24 10:37:44 inter-technics sshd[7715]: Failed password for root from 13.68.171.41 port 41146 ssh2 ... |
2020-06-24 19:49:42 |
| 203.128.249.42 | attackbotsspam |
|
2020-06-24 19:46:17 |
| 34.80.135.20 | attackbots | firewall-block, port(s): 17412/tcp |
2020-06-24 20:13:05 |
| 212.29.210.123 | attack | Invalid user cc from 212.29.210.123 port 55088 |
2020-06-24 20:09:38 |
| 111.229.169.170 | attackspambots | Oracle WebLogic wls9-async Remote Code Execution Vulnerability, PTR: PTR record not found |
2020-06-24 20:13:32 |
| 68.183.131.247 | attackspam | Invalid user chester from 68.183.131.247 port 51812 |
2020-06-24 19:57:14 |
| 1.53.207.225 | attackbotsspam | firewall-block, port(s): 445/tcp |
2020-06-24 20:18:14 |
| 49.88.112.73 | attackbots | Logfile match |
2020-06-24 20:01:04 |
| 139.219.1.209 | attackbots | Jun 23 15:23:03 zulu1842 sshd[16577]: Invalid user leo from 139.219.1.209 Jun 23 15:23:03 zulu1842 sshd[16577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.1.209 Jun 23 15:23:05 zulu1842 sshd[16577]: Failed password for invalid user leo from 139.219.1.209 port 44636 ssh2 Jun 23 15:23:05 zulu1842 sshd[16577]: Received disconnect from 139.219.1.209: 11: Bye Bye [preauth] Jun 23 15:34:34 zulu1842 sshd[20583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.1.209 user=r.r Jun 23 15:34:36 zulu1842 sshd[20583]: Failed password for r.r from 139.219.1.209 port 48546 ssh2 Jun 23 15:34:36 zulu1842 sshd[20583]: Received disconnect from 139.219.1.209: 11: Bye Bye [preauth] Jun 23 15:37:40 zulu1842 sshd[21731]: Invalid user renato from 139.219.1.209 Jun 23 15:37:40 zulu1842 sshd[21731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.1........ ------------------------------- |
2020-06-24 20:12:36 |
| 168.195.187.17 | attackspambots | Jun 24 13:56:08 xeon postfix/smtpd[53056]: warning: unknown[168.195.187.17]: SASL PLAIN authentication failed: authentication failure |
2020-06-24 20:16:48 |
| 148.72.158.240 | attack | SIPVicious Scanner Detection , PTR: condor3945.startdedicated.com. |
2020-06-24 20:26:28 |
| 83.97.20.35 | attackspam |
|
2020-06-24 19:45:27 |
| 156.96.156.158 | attackbotsspam | SIPVicious Scanner Detection , PTR: PTR record not found |
2020-06-24 20:22:50 |