City: Stuttgart
Region: Baden-Württemberg
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.142.15.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3052
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;53.142.15.94. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082100 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 22 02:46:39 CST 2019
;; MSG SIZE rcvd: 116
Host 94.15.142.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 94.15.142.53.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
177.135.93.227 | attackspam | SSH Bruteforce |
2019-10-27 15:53:26 |
93.172.41.54 | attackspambots | Automatic report - Port Scan Attack |
2019-10-27 16:23:15 |
159.192.133.106 | attackspam | Oct 27 01:58:55 firewall sshd[29416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.133.106 Oct 27 01:58:55 firewall sshd[29416]: Invalid user voravut from 159.192.133.106 Oct 27 01:58:57 firewall sshd[29416]: Failed password for invalid user voravut from 159.192.133.106 port 49681 ssh2 ... |
2019-10-27 16:14:56 |
212.237.53.69 | attackbots | Oct 26 23:45:55 ny01 sshd[10480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.69 Oct 26 23:45:58 ny01 sshd[10480]: Failed password for invalid user dn123 from 212.237.53.69 port 58234 ssh2 Oct 26 23:51:44 ny01 sshd[10979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.53.69 |
2019-10-27 15:59:35 |
222.186.175.215 | attack | Oct 27 09:22:05 MK-Soft-Root2 sshd[15255]: Failed password for root from 222.186.175.215 port 58368 ssh2 Oct 27 09:22:09 MK-Soft-Root2 sshd[15255]: Failed password for root from 222.186.175.215 port 58368 ssh2 ... |
2019-10-27 16:24:47 |
27.128.164.82 | attack | SSH bruteforce (Triggered fail2ban) |
2019-10-27 15:47:00 |
210.74.11.97 | attack | Lines containing failures of 210.74.11.97 Oct 25 10:52:42 dns01 sshd[29861]: Invalid user facai from 210.74.11.97 port 55126 Oct 25 10:52:42 dns01 sshd[29861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.74.11.97 Oct 25 10:52:44 dns01 sshd[29861]: Failed password for invalid user facai from 210.74.11.97 port 55126 ssh2 Oct 25 10:52:44 dns01 sshd[29861]: Received disconnect from 210.74.11.97 port 55126:11: Bye Bye [preauth] Oct 25 10:52:44 dns01 sshd[29861]: Disconnected from invalid user facai 210.74.11.97 port 55126 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=210.74.11.97 |
2019-10-27 16:04:35 |
83.20.113.252 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/83.20.113.252/ PL - 1H : (143) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PL NAME ASN : ASN5617 IP : 83.20.113.252 CIDR : 83.20.0.0/14 PREFIX COUNT : 183 UNIQUE IP COUNT : 5363456 ATTACKS DETECTED ASN5617 : 1H - 4 3H - 17 6H - 37 12H - 57 24H - 77 DateTime : 2019-10-27 04:51:28 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-27 16:08:00 |
81.22.45.65 | attack | 2019-10-27T09:17:56.184843+01:00 lumpi kernel: [1986672.199076] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=52916 PROTO=TCP SPT=46757 DPT=34075 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-27 16:21:06 |
116.115.198.226 | attackspambots | Unauthorised access (Oct 27) SRC=116.115.198.226 LEN=40 TTL=49 ID=62150 TCP DPT=8080 WINDOW=22712 SYN |
2019-10-27 16:25:17 |
88.84.200.139 | attack | Oct 26 18:34:11 auw2 sshd\[28302\]: Invalid user dj from 88.84.200.139 Oct 26 18:34:11 auw2 sshd\[28302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139 Oct 26 18:34:12 auw2 sshd\[28302\]: Failed password for invalid user dj from 88.84.200.139 port 46021 ssh2 Oct 26 18:38:07 auw2 sshd\[28584\]: Invalid user Privaten_123 from 88.84.200.139 Oct 26 18:38:07 auw2 sshd\[28584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139 |
2019-10-27 16:05:42 |
94.28.130.205 | attackbotsspam | Port scan on 2 port(s): 22 8291 |
2019-10-27 16:24:08 |
111.230.112.37 | attack | Oct 27 02:59:18 firewall sshd[31304]: Invalid user abc!QAZWSX from 111.230.112.37 Oct 27 02:59:20 firewall sshd[31304]: Failed password for invalid user abc!QAZWSX from 111.230.112.37 port 44108 ssh2 Oct 27 03:04:55 firewall sshd[31412]: Invalid user athletic from 111.230.112.37 ... |
2019-10-27 16:10:31 |
104.42.158.134 | attack | web-1 [ssh] SSH Attack |
2019-10-27 15:49:42 |
222.186.42.4 | attackbotsspam | Oct 27 07:49:51 localhost sshd[8108]: Failed password for root from 222.186.42.4 port 49784 ssh2 Oct 27 07:49:56 localhost sshd[8108]: Failed password for root from 222.186.42.4 port 49784 ssh2 Oct 27 07:50:00 localhost sshd[8108]: Failed password for root from 222.186.42.4 port 49784 ssh2 Oct 27 07:50:05 localhost sshd[8108]: Failed password for root from 222.186.42.4 port 49784 ssh2 Oct 27 07:50:05 localhost sshd[8108]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 49784 ssh2 [preauth] |
2019-10-27 16:09:41 |