City: Los Angeles
Region: California
Country: United States
Internet Service Provider: A220 SIA
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackbotsspam | Multiport scan : 68 ports scanned 81 82 83 84 85 88 100 113 139 143 199 214 280 322 444 465 497 505 510 514 515 548 554 591 620 623 631 636 666 731 771 783 789 808 898 900 901 989 990 992 993 994 999 1000 1001 1010 1022 1024 1026 1042 1080 1194 1200 1214 1220 1234 1241 1302 9668 9864 9870 9876 9943 9944 9981 9997 9999 10000 |
2020-07-20 06:03:28 |
| attackbotsspam | Jun 30 18:52:11 debian-2gb-nbg1-2 kernel: \[15794568.751558\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.92.126.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=57491 PROTO=TCP SPT=40696 DPT=8040 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-01 05:36:14 |
| attack | ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 8070 proto: TCP cat: Misc Attack |
2020-06-25 16:31:14 |
| attackbotsspam | firewall-block, port(s): 86/tcp, 92/tcp, 93/tcp, 8084/tcp, 8086/tcp, 8090/tcp |
2020-06-21 07:48:17 |
| attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 80 proto: TCP cat: Misc Attack |
2020-06-17 19:50:00 |
| attack | Port scan |
2020-06-09 18:09:23 |
| attackspambots | scan z |
2020-06-07 06:01:13 |
| attackspam | Unauthorized connection attempt detected from IP address 45.92.126.74 to port 80 |
2020-06-06 09:19:48 |
| attackbotsspam | TCP ports : 86 / 88 / 91 / 8080 / 8888 |
2020-06-03 08:13:13 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.92.126.90 | attackbots | Fail2Ban Ban Triggered |
2020-09-03 04:05:09 |
| 45.92.126.90 | attack |
|
2020-09-02 19:47:08 |
| 45.92.126.90 | attackbotsspam | Brute force attack stopped by firewall |
2020-08-29 07:38:42 |
| 45.92.126.250 | attackspam | SSH Bruteforce attempt |
2020-08-22 15:57:27 |
| 45.92.126.34 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-10-20 17:30:51 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.92.126.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.92.126.74. IN A
;; AUTHORITY SECTION:
. 596 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020060202 1800 900 604800 86400
;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 03 08:13:09 CST 2020
;; MSG SIZE rcvd: 116
Host 74.126.92.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.126.92.45.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.220.176.215 | attackbotsspam | 2020-05-27T09:54:11.314156morrigan.ad5gb.com sshd[23997]: Disconnected from authenticating user root 177.220.176.215 port 36859 [preauth] 2020-05-27T10:03:35.024684morrigan.ad5gb.com sshd[29784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.176.215 user=root 2020-05-27T10:03:37.074071morrigan.ad5gb.com sshd[29784]: Failed password for root from 177.220.176.215 port 11828 ssh2 |
2020-05-27 23:13:29 |
| 14.163.200.48 | attackspambots | 1590580405 - 05/27/2020 13:53:25 Host: 14.163.200.48/14.163.200.48 Port: 445 TCP Blocked |
2020-05-27 23:25:11 |
| 195.154.179.3 | attack | (mod_security) mod_security (id:210492) triggered by 195.154.179.3 (FR/France/195-154-179-3.rev.poneytelecom.eu): 5 in the last 3600 secs |
2020-05-27 23:12:25 |
| 60.190.243.230 | attackspambots | May 27 16:52:28 h2779839 sshd[17768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.190.243.230 user=root May 27 16:52:31 h2779839 sshd[17768]: Failed password for root from 60.190.243.230 port 61602 ssh2 May 27 16:58:08 h2779839 sshd[17946]: Invalid user hadoop from 60.190.243.230 port 61593 May 27 16:58:08 h2779839 sshd[17946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.190.243.230 May 27 16:58:08 h2779839 sshd[17946]: Invalid user hadoop from 60.190.243.230 port 61593 May 27 16:58:10 h2779839 sshd[17946]: Failed password for invalid user hadoop from 60.190.243.230 port 61593 ssh2 May 27 17:00:04 h2779839 sshd[17971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.190.243.230 user=root May 27 17:00:06 h2779839 sshd[17971]: Failed password for root from 60.190.243.230 port 62209 ssh2 May 27 17:02:00 h2779839 sshd[17992]: Invalid user admin from 60. ... |
2020-05-27 23:02:21 |
| 222.90.74.62 | attackbotsspam | 2020-05-27T14:34:31.339474shield sshd\[21911\]: Invalid user eachbytr from 222.90.74.62 port 51060 2020-05-27T14:34:31.343286shield sshd\[21911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.90.74.62 2020-05-27T14:34:33.976166shield sshd\[21911\]: Failed password for invalid user eachbytr from 222.90.74.62 port 51060 ssh2 2020-05-27T14:40:16.103543shield sshd\[23342\]: Invalid user home from 222.90.74.62 port 51058 2020-05-27T14:40:16.107418shield sshd\[23342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.90.74.62 |
2020-05-27 23:09:07 |
| 106.12.207.92 | attackspambots | May 27 13:53:52 ns3164893 sshd[10680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.92 May 27 13:53:54 ns3164893 sshd[10680]: Failed password for invalid user varnish from 106.12.207.92 port 54662 ssh2 ... |
2020-05-27 23:04:41 |
| 66.70.205.186 | attackspambots | 2020-05-27T11:50:39.253312shield sshd\[18281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=downloads.falepleno.com.br user=root 2020-05-27T11:50:40.802299shield sshd\[18281\]: Failed password for root from 66.70.205.186 port 54881 ssh2 2020-05-27T11:52:10.921281shield sshd\[18516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=downloads.falepleno.com.br user=root 2020-05-27T11:52:12.624371shield sshd\[18516\]: Failed password for root from 66.70.205.186 port 39581 ssh2 2020-05-27T11:53:44.594064shield sshd\[18782\]: Invalid user test from 66.70.205.186 port 52511 |
2020-05-27 23:12:02 |
| 106.75.156.107 | attack | May 27 16:46:50 pkdns2 sshd\[61595\]: Invalid user ameen from 106.75.156.107May 27 16:46:52 pkdns2 sshd\[61595\]: Failed password for invalid user ameen from 106.75.156.107 port 50840 ssh2May 27 16:50:46 pkdns2 sshd\[61773\]: Invalid user ds from 106.75.156.107May 27 16:50:48 pkdns2 sshd\[61773\]: Failed password for invalid user ds from 106.75.156.107 port 39068 ssh2May 27 16:54:25 pkdns2 sshd\[61904\]: Invalid user shaun from 106.75.156.107May 27 16:54:28 pkdns2 sshd\[61904\]: Failed password for invalid user shaun from 106.75.156.107 port 55518 ssh2 ... |
2020-05-27 23:12:59 |
| 140.143.197.56 | attackspambots | Brute-force attempt banned |
2020-05-27 23:06:48 |
| 18.230.150.137 | attackspambots | Automatic report - XMLRPC Attack |
2020-05-27 23:06:02 |
| 119.18.194.130 | attackspambots | May 27 17:14:07 Ubuntu-1404-trusty-64-minimal sshd\[30284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.18.194.130 user=root May 27 17:14:09 Ubuntu-1404-trusty-64-minimal sshd\[30284\]: Failed password for root from 119.18.194.130 port 43388 ssh2 May 27 17:19:04 Ubuntu-1404-trusty-64-minimal sshd\[604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.18.194.130 user=root May 27 17:19:06 Ubuntu-1404-trusty-64-minimal sshd\[604\]: Failed password for root from 119.18.194.130 port 38775 ssh2 May 27 17:22:43 Ubuntu-1404-trusty-64-minimal sshd\[3692\]: Invalid user apache from 119.18.194.130 May 27 17:22:43 Ubuntu-1404-trusty-64-minimal sshd\[3692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.18.194.130 |
2020-05-27 23:26:42 |
| 2.119.3.137 | attack | May 27 14:56:48 nextcloud sshd\[16481\]: Invalid user user from 2.119.3.137 May 27 14:56:48 nextcloud sshd\[16481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.119.3.137 May 27 14:56:50 nextcloud sshd\[16481\]: Failed password for invalid user user from 2.119.3.137 port 33761 ssh2 |
2020-05-27 22:55:45 |
| 45.14.224.165 | attackbots | 05/27/2020-08:29:06.109126 45.14.224.165 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-27 23:27:09 |
| 49.233.147.108 | attackbots | 2020-05-27T16:09:41.469990ollin.zadara.org sshd[13454]: Invalid user development from 49.233.147.108 port 38804 2020-05-27T16:09:43.695711ollin.zadara.org sshd[13454]: Failed password for invalid user development from 49.233.147.108 port 38804 ssh2 ... |
2020-05-27 23:03:20 |
| 118.24.116.20 | attackbotsspam | report |
2020-05-27 23:36:02 |