City: unknown
Region: unknown
Country: Russian Federation (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.138.187.161 | attack | Automatic report - Port Scan Attack |
2020-06-21 00:40:03 |
| 5.138.109.171 | attackbotsspam | " " |
2020-02-10 20:34:50 |
| 5.138.120.229 | attackspam | Autoban 5.138.120.229 AUTH/CONNECT |
2019-12-13 04:15:55 |
| 5.138.193.53 | attackbotsspam | Chat Spam |
2019-11-05 05:51:06 |
| 5.138.126.201 | attackspambots | 2323/tcp [2019-09-28]1pkt |
2019-09-28 19:06:42 |
| 5.138.173.69 | attackspam | 60001/tcp 60001/tcp [2019-08-20]2pkt |
2019-08-20 15:12:00 |
| 5.138.115.71 | attack | Imap |
2019-06-26 05:15:54 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.138.1.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36681
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.138.1.159. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:09:40 CST 2025
;; MSG SIZE rcvd: 104
Host 159.1.138.5.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 159.1.138.5.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.63.125.204 | attackspam | Found on Alienvault / proto=6 . srcport=30883 . dstport=5555 . (3848) |
2020-10-02 16:39:54 |
| 114.104.135.56 | attackspam | Oct 2 01:01:11 srv01 postfix/smtpd\[27252\]: warning: unknown\[114.104.135.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 01:01:22 srv01 postfix/smtpd\[27252\]: warning: unknown\[114.104.135.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 01:01:38 srv01 postfix/smtpd\[27252\]: warning: unknown\[114.104.135.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 01:01:57 srv01 postfix/smtpd\[27252\]: warning: unknown\[114.104.135.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 2 01:02:09 srv01 postfix/smtpd\[27252\]: warning: unknown\[114.104.135.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-02 16:29:56 |
| 104.224.187.120 | attackspam | Oct 2 13:07:16 gw1 sshd[564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.224.187.120 Oct 2 13:07:18 gw1 sshd[564]: Failed password for invalid user debian from 104.224.187.120 port 59460 ssh2 ... |
2020-10-02 16:08:03 |
| 182.162.17.234 | attackspambots | 2020-10-02T08:57:52.363735ks3355764 sshd[10584]: Invalid user user from 182.162.17.234 port 56691 2020-10-02T08:57:53.814508ks3355764 sshd[10584]: Failed password for invalid user user from 182.162.17.234 port 56691 ssh2 ... |
2020-10-02 16:15:29 |
| 157.230.42.76 | attackbotsspam | repeated SSH login attempts |
2020-10-02 16:40:57 |
| 2.57.122.209 | attack | Time: Fri Oct 2 07:00:10 2020 +0000 IP: 2.57.122.209 (NL/Netherlands/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Oct 2 06:59:45 sshd[18756]: Did not receive identification string from 2.57.122.209 port 50698 Oct 2 06:59:49 sshd[18760]: Invalid user muie from 2.57.122.209 port 51474 Oct 2 06:59:51 sshd[18760]: Failed password for invalid user muie from 2.57.122.209 port 51474 ssh2 Oct 2 07:00:01 sshd[18779]: Invalid user ubnt from 2.57.122.209 port 52181 Oct 2 07:00:02 sshd[18779]: Failed password for invalid user ubnt from 2.57.122.209 port 52181 ssh2 |
2020-10-02 16:30:45 |
| 122.51.241.109 | attackbots | Invalid user vagrant4 from 122.51.241.109 port 38802 |
2020-10-02 16:14:33 |
| 54.177.211.200 | attack | port scan and connect, tcp 23 (telnet) |
2020-10-02 16:41:10 |
| 223.247.153.244 | attackbots |
|
2020-10-02 16:12:49 |
| 193.106.175.55 | attackspambots | Oct 2 08:45:24 mxgate1 postfix/postscreen[13030]: CONNECT from [193.106.175.55]:48387 to [176.31.12.44]:25 Oct 2 08:45:24 mxgate1 postfix/dnsblog[13032]: addr 193.106.175.55 listed by domain zen.spamhaus.org as 127.0.0.2 Oct 2 08:45:24 mxgate1 postfix/dnsblog[13034]: addr 193.106.175.55 listed by domain b.barracudacentral.org as 127.0.0.2 Oct 2 08:45:30 mxgate1 postfix/postscreen[13030]: DNSBL rank 3 for [193.106.175.55]:48387 Oct x@x Oct 2 08:45:30 mxgate1 postfix/postscreen[13030]: DISCONNECT [193.106.175.55]:48387 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=193.106.175.55 |
2020-10-02 16:35:50 |
| 213.158.29.179 | attack | 2020-10-02T08:55:56.018812afi-git.jinr.ru sshd[10959]: Invalid user oscommerce from 213.158.29.179 port 37326 2020-10-02T08:55:56.022421afi-git.jinr.ru sshd[10959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.158.29.179 2020-10-02T08:55:56.018812afi-git.jinr.ru sshd[10959]: Invalid user oscommerce from 213.158.29.179 port 37326 2020-10-02T08:55:58.653540afi-git.jinr.ru sshd[10959]: Failed password for invalid user oscommerce from 213.158.29.179 port 37326 ssh2 2020-10-02T08:59:46.813760afi-git.jinr.ru sshd[11998]: Invalid user zy from 213.158.29.179 port 44248 ... |
2020-10-02 16:33:01 |
| 165.227.46.89 | attack | Oct 2 10:14:21 haigwepa sshd[27725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.46.89 Oct 2 10:14:23 haigwepa sshd[27725]: Failed password for invalid user juancarlos from 165.227.46.89 port 43928 ssh2 ... |
2020-10-02 16:27:27 |
| 178.128.54.182 | attack | 20 attempts against mh-ssh on cloud |
2020-10-02 16:36:05 |
| 118.24.109.70 | attackbots | Oct 2 14:05:27 itv-usvr-01 sshd[10927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.109.70 user=root Oct 2 14:05:29 itv-usvr-01 sshd[10927]: Failed password for root from 118.24.109.70 port 37766 ssh2 Oct 2 14:13:45 itv-usvr-01 sshd[11801]: Invalid user wt from 118.24.109.70 Oct 2 14:13:45 itv-usvr-01 sshd[11801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.109.70 Oct 2 14:13:45 itv-usvr-01 sshd[11801]: Invalid user wt from 118.24.109.70 Oct 2 14:13:47 itv-usvr-01 sshd[11801]: Failed password for invalid user wt from 118.24.109.70 port 51466 ssh2 |
2020-10-02 16:18:11 |
| 103.76.175.130 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-02T07:53:10Z and 2020-10-02T08:00:39Z |
2020-10-02 16:10:54 |