City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.136.70.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.136.70.204. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 15:41:35 CST 2025
;; MSG SIZE rcvd: 106
204.70.136.45.in-addr.arpa domain name pointer erp.alfachannel.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
204.70.136.45.in-addr.arpa name = erp.alfachannel.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.168.88.225 | attack | Jan 31 15:05:29 localhost sshd\[108012\]: Invalid user gaganamani from 104.168.88.225 port 59994 Jan 31 15:05:29 localhost sshd\[108012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.88.225 Jan 31 15:05:31 localhost sshd\[108012\]: Failed password for invalid user gaganamani from 104.168.88.225 port 59994 ssh2 Jan 31 15:10:11 localhost sshd\[108124\]: Invalid user gandhi from 104.168.88.225 port 42955 Jan 31 15:10:11 localhost sshd\[108124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.88.225 ... |
2020-01-31 23:28:41 |
| 192.99.25.95 | attack | CA_OVH
OVH_<177>1580460141 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 192.99.25.95:48147 |
2020-01-31 23:39:55 |
| 36.66.235.147 | attackbots | Automatic report - XMLRPC Attack |
2020-01-31 23:12:19 |
| 196.64.229.38 | attackspam | Jan 31 08:43:01 ns sshd[25229]: Connection from 196.64.229.38 port 57244 on 134.119.39.98 port 22 Jan 31 08:43:01 ns sshd[25229]: Invalid user admin1 from 196.64.229.38 port 57244 Jan 31 08:43:01 ns sshd[25229]: Failed password for invalid user admin1 from 196.64.229.38 port 57244 ssh2 Jan 31 08:43:02 ns sshd[25229]: Connection closed by 196.64.229.38 port 57244 [preauth] Jan 31 08:43:05 ns sshd[25545]: Connection from 196.64.229.38 port 58009 on 134.119.39.98 port 22 Jan 31 08:43:05 ns sshd[25545]: Invalid user admin1 from 196.64.229.38 port 58009 Jan 31 08:43:06 ns sshd[25545]: Failed password for invalid user admin1 from 196.64.229.38 port 58009 ssh2 Jan 31 08:43:06 ns sshd[25545]: Connection closed by 196.64.229.38 port 58009 [preauth] Jan 31 08:43:09 ns sshd[25722]: Connection from 196.64.229.38 port 58659 on 134.119.39.98 port 22 Jan 31 08:43:09 ns sshd[25722]: Invalid user admin1 from 196.64.229.38 port 58659 Jan 31 08:43:09 ns sshd[25722]: Failed password for in........ ------------------------------- |
2020-01-31 23:04:17 |
| 102.65.65.6 | attackspambots | TCP Port Scanning |
2020-01-31 23:38:00 |
| 95.226.183.46 | attackbots | Unauthorized connection attempt detected from IP address 95.226.183.46 to port 2220 [J] |
2020-01-31 22:59:51 |
| 159.203.193.51 | attackspam | firewall-block, port(s): 12732/tcp |
2020-01-31 23:11:28 |
| 103.242.173.118 | attackspam | Unauthorized connection attempt detected from IP address 103.242.173.118 to port 1433 [J] |
2020-01-31 23:35:04 |
| 180.241.44.68 | attackspam | Jan 31 09:26:58 toyboy sshd[30399]: Invalid user admin from 180.241.44.68 Jan 31 09:26:58 toyboy sshd[30403]: Invalid user admin from 180.241.44.68 Jan 31 09:26:58 toyboy sshd[30401]: Invalid user admin from 180.241.44.68 Jan 31 09:26:58 toyboy sshd[30399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.44.68 Jan 31 09:26:58 toyboy sshd[30403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.44.68 Jan 31 09:26:58 toyboy sshd[30401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.44.68 Jan 31 09:26:59 toyboy sshd[30399]: Failed password for invalid user admin from 180.241.44.68 port 33477 ssh2 Jan 31 09:26:59 toyboy sshd[30403]: Failed password for invalid user admin from 180.241.44.68 port 64720 ssh2 Jan 31 09:26:59 toyboy sshd[30401]: Failed password for invalid user admin from 180.241.44.68 port 13306 ssh2 Jan 31 09:26:59 to........ ------------------------------- |
2020-01-31 23:18:04 |
| 104.156.250.136 | attackspam | firewall-block, port(s): 16921/tcp, 16934/tcp, 16952/tcp, 16962/tcp, 17191/tcp, 17205/tcp, 17236/tcp, 17253/tcp |
2020-01-31 23:05:20 |
| 178.128.42.36 | attack | Unauthorized connection attempt detected from IP address 178.128.42.36 to port 3478 [J] |
2020-01-31 23:09:31 |
| 175.139.166.252 | attackspambots | Jan 31 09:31:07 srv01 sshd[12096]: Invalid user admin from 175.139.166.252 port 49307 Jan 31 09:31:07 srv01 sshd[12096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.166.252 Jan 31 09:31:07 srv01 sshd[12096]: Invalid user admin from 175.139.166.252 port 49307 Jan 31 09:31:09 srv01 sshd[12096]: Failed password for invalid user admin from 175.139.166.252 port 49307 ssh2 Jan 31 09:31:07 srv01 sshd[12096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.166.252 Jan 31 09:31:07 srv01 sshd[12096]: Invalid user admin from 175.139.166.252 port 49307 Jan 31 09:31:09 srv01 sshd[12096]: Failed password for invalid user admin from 175.139.166.252 port 49307 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=175.139.166.252 |
2020-01-31 23:32:03 |
| 159.65.158.30 | attackbotsspam | Invalid user saradasri from 159.65.158.30 port 40474 |
2020-01-31 23:32:51 |
| 221.225.83.148 | attackspam | Jan 31 14:08:40 game-panel sshd[28354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.225.83.148 Jan 31 14:08:41 game-panel sshd[28354]: Failed password for invalid user firaki from 221.225.83.148 port 36480 ssh2 Jan 31 14:15:39 game-panel sshd[28894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.225.83.148 |
2020-01-31 23:01:53 |
| 79.199.103.113 | attackspambots | Jan 31 02:28:22 shell sshd[11091]: Connection from 79.199.103.113 port 47652 on 66.146.192.9 port 22 Jan 31 02:28:22 shell sshd[11092]: Connection from 79.199.103.113 port 47654 on 66.146.192.9 port 22 Jan 31 02:28:25 shell sshd[11091]: Failed password for invalid user pi from 79.199.103.113 port 47652 ssh2 Jan 31 02:28:25 shell sshd[11092]: Failed password for invalid user pi from 79.199.103.113 port 47654 ssh2 Jan 31 02:28:26 shell sshd[11092]: Connection closed by 79.199.103.113 [preauth] Jan 31 02:28:26 shell sshd[11091]: Connection closed by 79.199.103.113 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=79.199.103.113 |
2020-01-31 23:23:55 |