City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.149.56.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.149.56.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022601 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 01:09:13 CST 2025
;; MSG SIZE rcvd: 105
Host 74.56.149.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.56.149.53.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 80.66.93.141 | attackspambots | $f2bV_matches |
2019-11-01 06:47:38 |
| 179.215.204.49 | attackspam | Automatic report - Port Scan Attack |
2019-11-01 06:52:57 |
| 191.81.9.209 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/191.81.9.209/ AR - 1H : (53) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : AR NAME ASN : ASN22927 IP : 191.81.9.209 CIDR : 191.80.0.0/14 PREFIX COUNT : 244 UNIQUE IP COUNT : 4001024 ATTACKS DETECTED ASN22927 : 1H - 2 3H - 4 6H - 7 12H - 13 24H - 32 DateTime : 2019-10-31 21:11:47 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-01 07:00:24 |
| 94.75.75.222 | attackbots | Nov 1 00:37:17 tuotantolaitos sshd[30348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.75.75.222 Nov 1 00:37:18 tuotantolaitos sshd[30348]: Failed password for invalid user za from 94.75.75.222 port 43688 ssh2 ... |
2019-11-01 06:43:54 |
| 89.33.8.34 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 53 proto: UDP cat: Misc Attack |
2019-11-01 07:13:07 |
| 37.59.114.113 | attack | 2019-10-31T22:46:25.281391abusebot-5.cloudsearch.cf sshd\[5359\]: Invalid user lxm from 37.59.114.113 port 34518 |
2019-11-01 06:46:28 |
| 62.234.83.50 | attack | Oct 31 18:35:11 plusreed sshd[14443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.83.50 user=root Oct 31 18:35:13 plusreed sshd[14443]: Failed password for root from 62.234.83.50 port 48474 ssh2 ... |
2019-11-01 06:40:15 |
| 209.50.54.22 | attackspambots | Oct 29 17:00:15 eola sshd[14870]: Invalid user globalflash from 209.50.54.22 port 47260 Oct 29 17:00:15 eola sshd[14870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.50.54.22 Oct 29 17:00:17 eola sshd[14870]: Failed password for invalid user globalflash from 209.50.54.22 port 47260 ssh2 Oct 29 17:00:17 eola sshd[14870]: Received disconnect from 209.50.54.22 port 47260:11: Bye Bye [preauth] Oct 29 17:00:17 eola sshd[14870]: Disconnected from 209.50.54.22 port 47260 [preauth] Oct 29 17:16:53 eola sshd[15545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.50.54.22 user=r.r Oct 29 17:16:55 eola sshd[15545]: Failed password for r.r from 209.50.54.22 port 44944 ssh2 Oct 29 17:16:55 eola sshd[15545]: Received disconnect from 209.50.54.22 port 44944:11: Bye Bye [preauth] Oct 29 17:16:55 eola sshd[15545]: Disconnected from 209.50.54.22 port 44944 [preauth] Oct 29 17:20:38 eola sshd[15........ ------------------------------- |
2019-11-01 06:42:37 |
| 189.238.250.82 | attackbots | Automatic report - SSH Brute-Force Attack |
2019-11-01 07:12:06 |
| 2a02:4780:8:2::20 | attackspambots | xmlrpc attack |
2019-11-01 07:05:01 |
| 61.160.121.146 | attackbots | Spam Timestamp : 31-Oct-19 19:07 BlockList Provider combined abuse (752) |
2019-11-01 07:08:20 |
| 180.76.244.97 | attack | Invalid user gulzar from 180.76.244.97 port 33541 |
2019-11-01 07:15:13 |
| 222.180.162.8 | attack | Aug 9 23:26:02 vtv3 sshd\[12516\]: Invalid user ftpuser from 222.180.162.8 port 40264 Aug 9 23:26:02 vtv3 sshd\[12516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8 Aug 9 23:26:04 vtv3 sshd\[12516\]: Failed password for invalid user ftpuser from 222.180.162.8 port 40264 ssh2 Aug 9 23:30:33 vtv3 sshd\[15028\]: Invalid user crichard from 222.180.162.8 port 44218 Aug 9 23:30:33 vtv3 sshd\[15028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8 Aug 9 23:42:51 vtv3 sshd\[20995\]: Invalid user ali from 222.180.162.8 port 34875 Aug 9 23:42:51 vtv3 sshd\[20995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.162.8 Aug 9 23:42:53 vtv3 sshd\[20995\]: Failed password for invalid user ali from 222.180.162.8 port 34875 ssh2 Aug 9 23:46:57 vtv3 sshd\[22951\]: Invalid user zorro from 222.180.162.8 port 59672 Aug 9 23:46:57 vtv3 sshd\[22951\]: pa |
2019-11-01 06:39:14 |
| 201.20.92.102 | attackspam | proto=tcp . spt=37198 . dpt=25 . (Found on Dark List de Oct 31) (754) |
2019-11-01 06:42:08 |
| 222.186.173.142 | attack | Oct 31 19:12:51 server sshd\[1706\]: Failed password for root from 222.186.173.142 port 42104 ssh2 Nov 1 01:32:00 server sshd\[23189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root Nov 1 01:32:02 server sshd\[23189\]: Failed password for root from 222.186.173.142 port 25282 ssh2 Nov 1 01:32:07 server sshd\[23189\]: Failed password for root from 222.186.173.142 port 25282 ssh2 Nov 1 01:32:11 server sshd\[23189\]: Failed password for root from 222.186.173.142 port 25282 ssh2 ... |
2019-11-01 06:37:30 |