City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.183.92.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.183.92.159. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:23:19 CST 2022
;; MSG SIZE rcvd: 106
Host 159.92.183.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 159.92.183.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.160.180.241 | attackbots | Sep 3 18:43:27 mellenthin postfix/smtpd[20267]: NOQUEUE: reject: RCPT from unknown[45.160.180.241]: 554 5.7.1 Service unavailable; Client host [45.160.180.241] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/45.160.180.241; from= |
2020-09-04 19:12:11 |
| 154.68.169.156 | attack | Honeypot attack, port: 445, PTR: JOR022-8025.mylan.co.za. |
2020-09-04 19:09:30 |
| 142.93.122.161 | attack | 142.93.122.161 - - [04/Sep/2020:11:18:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [04/Sep/2020:11:18:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2210 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [04/Sep/2020:11:18:51 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-04 19:08:05 |
| 13.76.212.215 | attackspam | TCP ports : 13772 / 31765 |
2020-09-04 19:08:20 |
| 222.98.173.216 | attackbotsspam | Failed password for invalid user cacti from 222.98.173.216 port 43580 ssh2 |
2020-09-04 19:25:21 |
| 106.13.71.1 | attackspambots | 2020-07-27 18:53:44,650 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:08:04,552 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:22:17,060 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:36:01,044 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:49:11,834 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 ... |
2020-09-04 19:18:56 |
| 39.153.252.94 | attack | Sep 2 19:43:54 www3-7 sshd[25235]: Did not receive identification string from 39.153.252.94 port 40327 Sep 3 11:50:01 www3-7 sshd[13399]: Did not receive identification string from 39.153.252.94 port 48125 Sep 3 11:50:08 www3-7 sshd[13482]: Invalid user user from 39.153.252.94 port 54153 Sep 3 11:50:09 www3-7 sshd[13482]: Connection closed by 39.153.252.94 port 54153 [preauth] Sep 3 11:51:03 www3-7 sshd[13486]: Invalid user oracle from 39.153.252.94 port 38673 Sep 3 11:51:07 www3-7 sshd[13486]: Connection closed by 39.153.252.94 port 38673 [preauth] Sep 3 11:51:09 www3-7 sshd[13545]: Invalid user admin from 39.153.252.94 port 49882 Sep 3 11:51:10 www3-7 sshd[13545]: Connection closed by 39.153.252.94 port 49882 [preauth] Sep 3 11:51:19 www3-7 sshd[13547]: Invalid user test from 39.153.252.94 port 53810 Sep 3 11:51:27 www3-7 sshd[13547]: Connection closed by 39.153.252.94 port 53810 [preauth] Sep 3 11:51:50 www3-7 sshd[13554]: Invalid user hadoop from 39.153.2........ ------------------------------- |
2020-09-04 19:02:47 |
| 207.58.170.145 | attack | Received: from netlemonger.com (207.58.170.145.nettlemonger.com. [207.58.170.145])
by mx.google.com with ESMTPS id e1si823792qka.206.2020.09.03.00.00.11
for <>
(version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128);
Thu, 03 Sep 2020 00:00:11 -0700 (PDT)
Received-SPF: neutral (google.com: 207.58.170.145 is neither permitted nor denied by best guess record for domain of return@restojob.lp) client-ip=207.58.170.145;
Authentication-Results: mx.google.com;
dkim=pass header.i=@nettlemonger.com header.s=key1 header.b=VfrF941Y;
spf=neutral (google.com: 207.58.170.145 is neither permitted nor denied by best guess record for domain of return@restojob.lp) smtp.mailfrom=return@restojob.lp;
dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nettlemonger.com |
2020-09-04 19:40:40 |
| 69.29.16.209 | attack | Honeypot attack, port: 445, PTR: 69-29-16-209.stat.centurytel.net. |
2020-09-04 19:26:50 |
| 115.79.199.66 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 19:31:39 |
| 185.220.102.250 | attackspam | Sep 4 12:56:59 kh-dev-server sshd[19701]: Failed password for root from 185.220.102.250 port 2604 ssh2 ... |
2020-09-04 19:26:15 |
| 117.107.168.98 | attackspam | Unauthorized connection attempt from IP address 117.107.168.98 on Port 445(SMB) |
2020-09-04 19:27:47 |
| 114.172.166.134 | attackspam | Sep 3 18:47:50 pixelmemory sshd[3481509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.172.166.134 Sep 3 18:47:50 pixelmemory sshd[3481509]: Invalid user le from 114.172.166.134 port 60131 Sep 3 18:47:52 pixelmemory sshd[3481509]: Failed password for invalid user le from 114.172.166.134 port 60131 ssh2 Sep 3 18:50:50 pixelmemory sshd[3481873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.172.166.134 user=root Sep 3 18:50:51 pixelmemory sshd[3481873]: Failed password for root from 114.172.166.134 port 54326 ssh2 ... |
2020-09-04 19:18:39 |
| 43.224.130.146 | attackbotsspam | Sep 4 09:49:17 sso sshd[16056]: Failed password for root from 43.224.130.146 port 14318 ssh2 ... |
2020-09-04 19:01:24 |
| 103.136.9.253 | attackbotsspam | 103.136.9.253 - - \[04/Sep/2020:07:49:32 +0200\] "POST /wp-login.php HTTP/1.0" 200 8748 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.136.9.253 - - \[04/Sep/2020:07:49:34 +0200\] "POST /wp-login.php HTTP/1.0" 200 8576 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 103.136.9.253 - - \[04/Sep/2020:07:49:37 +0200\] "POST /wp-login.php HTTP/1.0" 200 8574 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-09-04 18:59:48 |