City: unknown
Region: unknown
Country: Germany
Internet Service Provider: A100 ROW GmbH
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackbotsspam | May 6 15:04:31 sso sshd[22814]: Failed password for root from 54.93.104.49 port 55345 ssh2 ... |
2020-05-07 03:37:59 |
attackbotsspam | Apr 20 01:51:34 gw1 sshd[30363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.93.104.49 Apr 20 01:51:36 gw1 sshd[30363]: Failed password for invalid user ftpuser from 54.93.104.49 port 51671 ssh2 ... |
2020-04-20 05:35:00 |
attack | $f2bV_matches |
2020-04-19 00:56:16 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.93.104.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.93.104.49. IN A
;; AUTHORITY SECTION:
. 470 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020041800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 00:56:11 CST 2020
;; MSG SIZE rcvd: 116
49.104.93.54.in-addr.arpa domain name pointer ec2-54-93-104-49.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.104.93.54.in-addr.arpa name = ec2-54-93-104-49.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
210.126.5.91 | attack | 901. On Jul 16 2020 experienced a Brute Force SSH login attempt -> 18 unique times by 210.126.5.91. |
2020-07-17 07:18:26 |
191.53.238.163 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:50:16 |
179.125.63.146 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 07:02:32 |
177.130.162.190 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 07:08:34 |
200.66.124.78 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:48:10 |
109.232.4.74 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 07:13:42 |
177.87.68.246 | attackbots | SASL PLAIN auth failed: ruser=... |
2020-07-17 07:09:28 |
187.109.46.47 | attackbots | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:55:11 |
181.48.28.13 | attackbotsspam | SSH Brute-Force. Ports scanning. |
2020-07-17 07:06:49 |
36.189.255.162 | attackbotsspam | Jul 17 00:04:29 abendstille sshd\[29482\]: Invalid user honey from 36.189.255.162 Jul 17 00:04:29 abendstille sshd\[29482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.255.162 Jul 17 00:04:32 abendstille sshd\[29482\]: Failed password for invalid user honey from 36.189.255.162 port 40956 ssh2 Jul 17 00:08:57 abendstille sshd\[1293\]: Invalid user admin from 36.189.255.162 Jul 17 00:08:57 abendstille sshd\[1293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.255.162 ... |
2020-07-17 07:21:05 |
191.53.236.144 | attack | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:51:03 |
185.46.217.70 | attackbots | SASL PLAIN auth failed: ruser=... |
2020-07-17 07:00:43 |
186.96.196.104 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:58:59 |
202.52.253.82 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-07-17 06:46:17 |
177.154.237.142 | attackspambots | SASL PLAIN auth failed: ruser=... |
2020-07-17 07:07:44 |