City: unknown
Region: unknown
Country: Russian Federation (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.80.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.45.80.160. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:44:35 CST 2025
;; MSG SIZE rcvd: 104
Host 160.80.45.5.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 160.80.45.5.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
139.59.23.25 | attack | Aug 22 23:49:43 MK-Soft-VM6 sshd\[19054\]: Invalid user spark from 139.59.23.25 port 34646 Aug 22 23:49:43 MK-Soft-VM6 sshd\[19054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.25 Aug 22 23:49:45 MK-Soft-VM6 sshd\[19054\]: Failed password for invalid user spark from 139.59.23.25 port 34646 ssh2 ... |
2019-08-23 08:11:08 |
191.6.175.64 | attackbotsspam | Try access to SMTP/POP/IMAP server. |
2019-08-23 08:23:12 |
59.52.27.142 | attackbots | Unauthorized connection attempt from IP address 59.52.27.142 on Port 445(SMB) |
2019-08-23 08:26:00 |
188.128.39.127 | attackspam | Aug 22 14:25:42 dallas01 sshd[7685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.127 Aug 22 14:25:44 dallas01 sshd[7685]: Failed password for invalid user ejames from 188.128.39.127 port 56656 ssh2 Aug 22 14:29:48 dallas01 sshd[8289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.39.127 |
2019-08-23 08:30:03 |
157.230.103.158 | attackbots | Splunk® : port scan detected: Aug 22 20:04:55 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=157.230.103.158 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=54321 PROTO=TCP SPT=44858 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0 |
2019-08-23 08:29:14 |
51.77.140.111 | attack | Aug 23 01:24:05 OPSO sshd\[14821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111 user=root Aug 23 01:24:08 OPSO sshd\[14821\]: Failed password for root from 51.77.140.111 port 56102 ssh2 Aug 23 01:28:04 OPSO sshd\[15511\]: Invalid user service from 51.77.140.111 port 45422 Aug 23 01:28:04 OPSO sshd\[15511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111 Aug 23 01:28:07 OPSO sshd\[15511\]: Failed password for invalid user service from 51.77.140.111 port 45422 ssh2 |
2019-08-23 07:58:11 |
36.228.150.95 | attack | firewall-block, port(s): 23/tcp |
2019-08-23 08:24:27 |
12.34.56.18 | attackbots | Aug 23 00:31:30 DAAP sshd[31945]: Invalid user prueba2 from 12.34.56.18 port 41879 ... |
2019-08-23 07:46:28 |
167.99.202.70 | attackspam | Aug 22 21:32:48 pegasus sshd[30134]: Failed password for invalid user jukebox from 167.99.202.70 port 47066 ssh2 Aug 22 21:32:48 pegasus sshd[30134]: Received disconnect from 167.99.202.70 port 47066:11: Bye Bye [preauth] Aug 22 21:32:48 pegasus sshd[30134]: Disconnected from 167.99.202.70 port 47066 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=167.99.202.70 |
2019-08-23 08:25:00 |
141.98.80.74 | attackbotsspam | Time: Thu Aug 22 20:22:20 2019 -0300 IP: 141.98.80.74 (PA/Panama/-) Failures: 5 (smtpauth) Interval: 3600 seconds Blocked: Permanent Block |
2019-08-23 08:17:24 |
176.31.100.19 | attack | Aug 23 01:41:04 dedicated sshd[5506]: Invalid user furukawa from 176.31.100.19 port 38208 |
2019-08-23 07:49:20 |
119.3.179.89 | attack | Aug 22 19:04:20 web1 postfix/smtpd[29976]: warning: unknown[119.3.179.89]: SASL LOGIN authentication failed: authentication failure ... |
2019-08-23 08:04:57 |
208.81.163.110 | attackspambots | Aug 22 13:33:57 hiderm sshd\[32043\]: Invalid user wei from 208.81.163.110 Aug 22 13:33:57 hiderm sshd\[32043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mrtg.thecable.net Aug 22 13:33:59 hiderm sshd\[32043\]: Failed password for invalid user wei from 208.81.163.110 port 40360 ssh2 Aug 22 13:38:27 hiderm sshd\[32464\]: Invalid user jeff from 208.81.163.110 Aug 22 13:38:27 hiderm sshd\[32464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mrtg.thecable.net |
2019-08-23 07:52:42 |
115.55.57.75 | attackbots | firewall-block, port(s): 23/tcp |
2019-08-23 08:08:20 |
122.228.19.79 | attackspambots | " " |
2019-08-23 07:57:41 |