City: Los Angeles
Region: California
Country: United States
Internet Service Provider: A220 SIA
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackbotsspam | Multiport scan : 68 ports scanned 81 82 83 84 85 88 100 113 139 143 199 214 280 322 444 465 497 505 510 514 515 548 554 591 620 623 631 636 666 731 771 783 789 808 898 900 901 989 990 992 993 994 999 1000 1001 1010 1022 1024 1026 1042 1080 1194 1200 1214 1220 1234 1241 1302 9668 9864 9870 9876 9943 9944 9981 9997 9999 10000 |
2020-07-20 06:03:28 |
attackbotsspam | Jun 30 18:52:11 debian-2gb-nbg1-2 kernel: \[15794568.751558\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.92.126.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=57491 PROTO=TCP SPT=40696 DPT=8040 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-01 05:36:14 |
attack | ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 8070 proto: TCP cat: Misc Attack |
2020-06-25 16:31:14 |
attackbotsspam | firewall-block, port(s): 86/tcp, 92/tcp, 93/tcp, 8084/tcp, 8086/tcp, 8090/tcp |
2020-06-21 07:48:17 |
attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 80 proto: TCP cat: Misc Attack |
2020-06-17 19:50:00 |
attack | Port scan |
2020-06-09 18:09:23 |
attackspambots | scan z |
2020-06-07 06:01:13 |
attackspam | Unauthorized connection attempt detected from IP address 45.92.126.74 to port 80 |
2020-06-06 09:19:48 |
attackbotsspam | TCP ports : 86 / 88 / 91 / 8080 / 8888 |
2020-06-03 08:13:13 |
IP | Type | Details | Datetime |
---|---|---|---|
45.92.126.90 | attackbots | Fail2Ban Ban Triggered |
2020-09-03 04:05:09 |
45.92.126.90 | attack |
|
2020-09-02 19:47:08 |
45.92.126.90 | attackbotsspam | Brute force attack stopped by firewall |
2020-08-29 07:38:42 |
45.92.126.250 | attackspam | SSH Bruteforce attempt |
2020-08-22 15:57:27 |
45.92.126.34 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-10-20 17:30:51 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.92.126.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.92.126.74. IN A
;; AUTHORITY SECTION:
. 596 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020060202 1800 900 604800 86400
;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 03 08:13:09 CST 2020
;; MSG SIZE rcvd: 116
Host 74.126.92.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.126.92.45.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
193.228.91.109 | attackbots |
|
2020-09-02 21:49:53 |
218.82.243.77 | attackbots | Unauthorized connection attempt from IP address 218.82.243.77 on Port 445(SMB) |
2020-09-02 22:13:47 |
92.195.107.89 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-09-02 21:42:30 |
177.246.211.58 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-09-02 22:02:14 |
5.239.122.127 | attack | Automatic report - Port Scan Attack |
2020-09-02 21:32:45 |
198.199.72.47 | attackbotsspam | firewall-block, port(s): 24521/tcp |
2020-09-02 21:34:39 |
160.153.245.123 | attack | 160.153.245.123 - - [02/Sep/2020:14:00:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 160.153.245.123 - - [02/Sep/2020:14:00:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 160.153.245.123 - - [02/Sep/2020:14:01:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-02 21:42:44 |
111.229.103.45 | attackspam | Invalid user bdos from 111.229.103.45 port 59130 |
2020-09-02 22:00:42 |
52.173.253.120 | attack | Invalid user student from 52.173.253.120 port 1792 |
2020-09-02 21:40:15 |
180.167.53.18 | attack | Sep 2 11:17:24 lnxweb62 sshd[24420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.53.18 |
2020-09-02 21:52:43 |
176.59.64.27 | attackbots | Unauthorized connection attempt from IP address 176.59.64.27 on Port 445(SMB) |
2020-09-02 22:16:06 |
188.0.115.42 | attackbotsspam | SMB Server BruteForce Attack |
2020-09-02 21:43:08 |
222.186.180.130 | attackbotsspam | Sep 2 14:28:27 rocket sshd[15163]: Failed password for root from 222.186.180.130 port 42440 ssh2 Sep 2 14:28:39 rocket sshd[15180]: Failed password for root from 222.186.180.130 port 32258 ssh2 ... |
2020-09-02 21:35:24 |
5.196.8.72 | attack | Sep 2 04:17:50 localhost sshd\[28408\]: Invalid user monit from 5.196.8.72 port 60864 Sep 2 04:17:50 localhost sshd\[28408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.8.72 Sep 2 04:17:53 localhost sshd\[28408\]: Failed password for invalid user monit from 5.196.8.72 port 60864 ssh2 ... |
2020-09-02 21:33:06 |
192.3.139.56 | attack | 2020-09-02 08:10:09.471644-0500 localhost sshd[92892]: Failed password for invalid user tss3 from 192.3.139.56 port 41400 ssh2 |
2020-09-02 21:47:54 |