City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.1.248.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.1.248.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:10:58 CST 2025
;; MSG SIZE rcvd: 103
Host 39.248.1.5.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 39.248.1.5.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.69.249.194 | attackspam | SSH brutforce |
2020-09-16 16:57:09 |
| 51.75.173.165 | attack | RDP Brute-Force (honeypot 7) |
2020-09-16 16:54:23 |
| 139.199.197.45 | attack | $f2bV_matches |
2020-09-16 17:00:33 |
| 192.236.236.158 | attackspambots | Received: from mailsadmins.biz (slot0.mailsadmins.biz [192.236.236.158]) Subject: ****SPAM**** michael mehr Sex statt Corona Date: Tue, 15 Sep 2020 15:58:54 +0000 From: "ACHTUNG" |
2020-09-16 16:32:00 |
| 94.173.228.41 | attack | 94.173.228.41 - - [15/Sep/2020:17:56:53 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 94.173.228.41 - - [15/Sep/2020:17:56:53 +0100] "POST /wp-login.php HTTP/1.1" 200 7651 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 94.173.228.41 - - [15/Sep/2020:17:57:54 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" ... |
2020-09-16 16:38:06 |
| 121.229.63.151 | attack | (sshd) Failed SSH login from 121.229.63.151 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 03:15:13 server5 sshd[17817]: Invalid user admin from 121.229.63.151 Sep 16 03:15:13 server5 sshd[17817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.63.151 Sep 16 03:15:15 server5 sshd[17817]: Failed password for invalid user admin from 121.229.63.151 port 18086 ssh2 Sep 16 03:18:16 server5 sshd[2271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.63.151 user=root Sep 16 03:18:18 server5 sshd[2271]: Failed password for root from 121.229.63.151 port 56790 ssh2 |
2020-09-16 16:35:26 |
| 203.148.20.162 | attackbots | Sep 16 10:07:59 plg sshd[22489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.20.162 Sep 16 10:08:01 plg sshd[22489]: Failed password for invalid user jhapzvpn from 203.148.20.162 port 44426 ssh2 Sep 16 10:10:01 plg sshd[22575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.20.162 Sep 16 10:10:03 plg sshd[22575]: Failed password for invalid user butter from 203.148.20.162 port 40998 ssh2 Sep 16 10:12:00 plg sshd[22633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.20.162 user=root Sep 16 10:12:02 plg sshd[22633]: Failed password for invalid user root from 203.148.20.162 port 37562 ssh2 ... |
2020-09-16 16:41:17 |
| 104.198.16.231 | attackspambots | " " |
2020-09-16 16:39:19 |
| 118.180.251.9 | attackspambots | Sep 16 03:03:04 vps647732 sshd[4107]: Failed password for root from 118.180.251.9 port 45224 ssh2 ... |
2020-09-16 16:33:16 |
| 61.191.55.33 | attackbots | 2020-09-16T04:58:15.113383vps1033 sshd[29154]: Failed password for root from 61.191.55.33 port 37580 ssh2 2020-09-16T05:03:05.147981vps1033 sshd[7156]: Invalid user gotubego from 61.191.55.33 port 38211 2020-09-16T05:03:05.159662vps1033 sshd[7156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.191.55.33 2020-09-16T05:03:05.147981vps1033 sshd[7156]: Invalid user gotubego from 61.191.55.33 port 38211 2020-09-16T05:03:07.688855vps1033 sshd[7156]: Failed password for invalid user gotubego from 61.191.55.33 port 38211 ssh2 ... |
2020-09-16 16:44:37 |
| 201.102.59.240 | attackspam | 2020-09-16T06:45:03.255873vps-d63064a2 sshd[35615]: User root from 201.102.59.240 not allowed because not listed in AllowUsers 2020-09-16T06:45:05.702747vps-d63064a2 sshd[35615]: Failed password for invalid user root from 201.102.59.240 port 50086 ssh2 2020-09-16T06:52:24.163360vps-d63064a2 sshd[35678]: User root from 201.102.59.240 not allowed because not listed in AllowUsers 2020-09-16T06:52:24.180277vps-d63064a2 sshd[35678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.102.59.240 user=root 2020-09-16T06:52:24.163360vps-d63064a2 sshd[35678]: User root from 201.102.59.240 not allowed because not listed in AllowUsers 2020-09-16T06:52:26.480094vps-d63064a2 sshd[35678]: Failed password for invalid user root from 201.102.59.240 port 60144 ssh2 ... |
2020-09-16 16:22:05 |
| 95.173.161.167 | attackspam | 95.173.161.167 - - [16/Sep/2020:10:15:20 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 95.173.161.167 - - [16/Sep/2020:10:15:23 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 95.173.161.167 - - [16/Sep/2020:10:15:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-16 16:49:11 |
| 75.130.124.90 | attackspambots | (sshd) Failed SSH login from 75.130.124.90 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 04:10:38 jbs1 sshd[30449]: Invalid user user from 75.130.124.90 Sep 16 04:10:40 jbs1 sshd[30449]: Failed password for invalid user user from 75.130.124.90 port 5426 ssh2 Sep 16 04:20:11 jbs1 sshd[1301]: Invalid user user from 75.130.124.90 Sep 16 04:20:13 jbs1 sshd[1301]: Failed password for invalid user user from 75.130.124.90 port 38890 ssh2 Sep 16 04:25:05 jbs1 sshd[3679]: Failed password for root from 75.130.124.90 port 14922 ssh2 |
2020-09-16 16:27:25 |
| 168.90.49.190 | attack | Sep 16 03:41:35 santamaria sshd\[21931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.49.190 user=root Sep 16 03:41:37 santamaria sshd\[21931\]: Failed password for root from 168.90.49.190 port 63069 ssh2 Sep 16 03:46:07 santamaria sshd\[21970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.49.190 user=root ... |
2020-09-16 16:32:46 |
| 86.171.61.84 | attack | Sep 16 08:00:37 vps-51d81928 sshd[103894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.171.61.84 Sep 16 08:00:37 vps-51d81928 sshd[103894]: Invalid user admin from 86.171.61.84 port 56586 Sep 16 08:00:39 vps-51d81928 sshd[103894]: Failed password for invalid user admin from 86.171.61.84 port 56586 ssh2 Sep 16 08:04:51 vps-51d81928 sshd[103946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.171.61.84 user=root Sep 16 08:04:53 vps-51d81928 sshd[103946]: Failed password for root from 86.171.61.84 port 40324 ssh2 ... |
2020-09-16 17:00:48 |