City: unknown
Region: unknown
Country: Hungary
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.139.139.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.139.139.0. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 11:50:16 CST 2025
;; MSG SIZE rcvd: 105
Host 0.139.139.46.in-addr.arpa not found: 2(SERVFAIL)
server can't find 46.139.139.0.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 188.127.39.46 | attack | RCPT=EAVAIL |
2020-06-10 01:12:24 |
| 222.186.30.112 | attackspambots | Unauthorized connection attempt detected from IP address 222.186.30.112 to port 22 |
2020-06-10 01:13:47 |
| 185.153.196.230 | attackspambots | Fail2Ban Ban Triggered (2) |
2020-06-10 01:04:13 |
| 81.94.255.12 | attack | ssh intrusion attempt |
2020-06-10 00:51:54 |
| 139.0.176.245 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-10 01:04:49 |
| 106.13.24.164 | attackspambots | Jun 9 17:04:28 gw1 sshd[24554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.24.164 Jun 9 17:04:30 gw1 sshd[24554]: Failed password for invalid user ftpuser from 106.13.24.164 port 60438 ssh2 ... |
2020-06-10 01:05:02 |
| 192.35.168.199 | attack | US_Merit_<177>1591717731 [1:2402000:5570] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]: |
2020-06-10 00:45:19 |
| 163.172.61.214 | attackspambots | Jun 9 10:19:56 Host-KLAX-C sshd[32292]: Invalid user jira from 163.172.61.214 port 46815 ... |
2020-06-10 01:01:33 |
| 139.99.148.4 | attackspambots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-10 01:09:00 |
| 109.201.152.10 | attackbots | fell into ViewStateTrap:oslo |
2020-06-10 01:23:02 |
| 49.232.107.237 | attackspam | 49.232.107.237 - - [09/Jun/2020:16:42:16 +0200] "GET /wp-login.php HTTP/1.1" 200 6521 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 49.232.107.237 - - [09/Jun/2020:16:42:23 +0200] "POST /wp-login.php HTTP/1.1" 200 6772 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 49.232.107.237 - - [09/Jun/2020:16:42:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-10 00:55:14 |
| 193.112.247.98 | attack | Jun 9 18:48:18 haigwepa sshd[13102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.247.98 Jun 9 18:48:21 haigwepa sshd[13102]: Failed password for invalid user smon from 193.112.247.98 port 36278 ssh2 ... |
2020-06-10 00:53:09 |
| 195.54.160.211 | attack | Fail2Ban Ban Triggered |
2020-06-10 00:48:12 |
| 49.233.79.78 | attackspambots | Jun 9 16:47:54 ns392434 sshd[629]: Invalid user araujo from 49.233.79.78 port 45160 Jun 9 16:47:54 ns392434 sshd[629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.79.78 Jun 9 16:47:54 ns392434 sshd[629]: Invalid user araujo from 49.233.79.78 port 45160 Jun 9 16:47:56 ns392434 sshd[629]: Failed password for invalid user araujo from 49.233.79.78 port 45160 ssh2 Jun 9 16:51:49 ns392434 sshd[813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.79.78 user=root Jun 9 16:51:52 ns392434 sshd[813]: Failed password for root from 49.233.79.78 port 52614 ssh2 Jun 9 16:54:26 ns392434 sshd[911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.79.78 user=root Jun 9 16:54:28 ns392434 sshd[911]: Failed password for root from 49.233.79.78 port 49596 ssh2 Jun 9 16:56:58 ns392434 sshd[936]: Invalid user rh from 49.233.79.78 port 46566 |
2020-06-10 01:19:18 |
| 218.17.162.119 | attackbots | Unauthorized connection attempt detected from IP address 218.17.162.119 to port 7031 |
2020-06-10 00:54:53 |