City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.1.20.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.1.20.209. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 23:17:48 CST 2025
;; MSG SIZE rcvd: 104
Host 209.20.1.45.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 209.20.1.45.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.72.190 | attackspam | Failed password for invalid user openlava from 106.13.72.190 port 39160 ssh2 |
2020-07-06 18:48:04 |
| 141.98.10.208 | attackbots | Jul 6 11:58:52 srv01 postfix/smtpd\[23902\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 6 11:59:37 srv01 postfix/smtpd\[13112\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 6 12:00:09 srv01 postfix/smtpd\[13862\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 6 12:01:15 srv01 postfix/smtpd\[7434\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 6 12:03:45 srv01 postfix/smtpd\[13197\]: warning: unknown\[141.98.10.208\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-06 18:25:50 |
| 218.36.252.3 | attackbotsspam | Jul 6 12:05:31 abendstille sshd\[25318\]: Invalid user mailman from 218.36.252.3 Jul 6 12:05:31 abendstille sshd\[25318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.36.252.3 Jul 6 12:05:34 abendstille sshd\[25318\]: Failed password for invalid user mailman from 218.36.252.3 port 56794 ssh2 Jul 6 12:07:41 abendstille sshd\[27857\]: Invalid user samba from 218.36.252.3 Jul 6 12:07:41 abendstille sshd\[27857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.36.252.3 ... |
2020-07-06 18:21:18 |
| 118.70.233.206 | attack | Jul 6 06:43:03 vps687878 sshd\[10035\]: Failed password for root from 118.70.233.206 port 56986 ssh2 Jul 6 06:47:16 vps687878 sshd\[10385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.233.206 user=root Jul 6 06:47:19 vps687878 sshd\[10385\]: Failed password for root from 118.70.233.206 port 54058 ssh2 Jul 6 06:51:23 vps687878 sshd\[10797\]: Invalid user jsz from 118.70.233.206 port 51128 Jul 6 06:51:23 vps687878 sshd\[10797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.233.206 ... |
2020-07-06 18:24:07 |
| 117.89.132.235 | attackbots | Jul 6 06:28:59 ws24vmsma01 sshd[195698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.132.235 Jul 6 06:29:00 ws24vmsma01 sshd[195698]: Failed password for invalid user user2 from 117.89.132.235 port 46452 ssh2 ... |
2020-07-06 18:40:28 |
| 159.65.142.103 | attackspambots | Jul 6 11:59:10 debian-2gb-nbg1-2 kernel: \[16288160.005705\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=159.65.142.103 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=24519 PROTO=TCP SPT=56682 DPT=20036 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-06 18:46:59 |
| 27.3.66.214 | attack | 1594007353 - 07/06/2020 05:49:13 Host: 27.3.66.214/27.3.66.214 Port: 445 TCP Blocked |
2020-07-06 18:13:10 |
| 59.144.48.34 | attack | 2020-07-06T09:41:38.531448abusebot.cloudsearch.cf sshd[22596]: Invalid user nn from 59.144.48.34 port 14539 2020-07-06T09:41:38.539856abusebot.cloudsearch.cf sshd[22596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34 2020-07-06T09:41:38.531448abusebot.cloudsearch.cf sshd[22596]: Invalid user nn from 59.144.48.34 port 14539 2020-07-06T09:41:40.310309abusebot.cloudsearch.cf sshd[22596]: Failed password for invalid user nn from 59.144.48.34 port 14539 ssh2 2020-07-06T09:45:23.269020abusebot.cloudsearch.cf sshd[22702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.48.34 user=root 2020-07-06T09:45:24.929013abusebot.cloudsearch.cf sshd[22702]: Failed password for root from 59.144.48.34 port 23747 ssh2 2020-07-06T09:48:57.696450abusebot.cloudsearch.cf sshd[22781]: Invalid user ruslan from 59.144.48.34 port 5335 ... |
2020-07-06 18:05:51 |
| 91.185.33.66 | attackbotsspam | VNC brute force attack detected by fail2ban |
2020-07-06 18:08:17 |
| 142.112.145.68 | attack | (From fletcher.lyons11@gmail.com) TITLE: Are YOU Building Your Own DREAMS Or Has SOMEONE ELSE Hired You To Build THEIRS? DESCRIPTION: Have you ever looked at sites like Google or Facebook and asked yourself…“How can they make SO MUCH MONEY when they aren’t even really selling any products?!?!” Well, Google and Facebook are cashing in on their platforms. They’re taking advantage of the millions of people who come to their sites…Then view and click the ads on their pages. Those sites have turned into billion dollar companies by getting paid to send traffic to businesses. Did You Know That More People Have Become Millionaires In The Past Year Than Ever Before? Did You Know You Can Make Money By Becoming A Traffic Affiliate? Watch Our Video & Discover The Easy 1-Step System Our Members Are Using To Get Paid Daily. URL: https://bit.ly/retirement-biz |
2020-07-06 18:30:12 |
| 68.183.77.157 | attack | Jul 6 07:31:33 ssh2 sshd[59545]: User root from skaerbaek.minlandsby.dk not allowed because not listed in AllowUsers Jul 6 07:31:33 ssh2 sshd[59545]: Failed password for invalid user root from 68.183.77.157 port 34462 ssh2 Jul 6 07:31:33 ssh2 sshd[59545]: Connection closed by invalid user root 68.183.77.157 port 34462 [preauth] ... |
2020-07-06 18:01:20 |
| 112.85.42.188 | attackbotsspam | 07/06/2020-06:41:59.075121 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-07-06 18:44:00 |
| 128.199.157.63 | attackbotsspam | 2020-07-06T17:24:23.411890hostname sshd[109965]: Failed password for invalid user magda from 128.199.157.63 port 53304 ssh2 ... |
2020-07-06 18:32:36 |
| 101.36.177.240 | attack | Jul 6 14:18:20 itv-usvr-01 sshd[9154]: Invalid user clj from 101.36.177.240 Jul 6 14:18:20 itv-usvr-01 sshd[9154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.177.240 Jul 6 14:18:20 itv-usvr-01 sshd[9154]: Invalid user clj from 101.36.177.240 Jul 6 14:18:22 itv-usvr-01 sshd[9154]: Failed password for invalid user clj from 101.36.177.240 port 52476 ssh2 Jul 6 14:19:54 itv-usvr-01 sshd[9214]: Invalid user netflix from 101.36.177.240 |
2020-07-06 18:45:49 |
| 199.195.251.227 | attack | Tried sshing with brute force. |
2020-07-06 18:20:16 |