City: Frankfurt am Main
Region: Hesse
Country: Germany
Internet Service Provider: A100 ROW GmbH
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackspam | 54.93.138.29 - - [08/Nov/2019:08:01:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2117 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 54.93.138.29 - - [08/Nov/2019:08:01:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-11-08 15:51:43 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.93.138.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.93.138.29. IN A
;; AUTHORITY SECTION:
. 502 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110800 1800 900 604800 86400
;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 08 15:51:39 CST 2019
;; MSG SIZE rcvd: 116
29.138.93.54.in-addr.arpa domain name pointer ec2-54-93-138-29.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.138.93.54.in-addr.arpa name = ec2-54-93-138-29.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
66.96.235.120 | attackbots | Unauthorised access (Apr 21) SRC=66.96.235.120 LEN=52 TTL=117 ID=28286 DF TCP DPT=445 WINDOW=8192 SYN |
2020-04-21 18:49:39 |
85.209.0.16 | attackspambots | Apr 21 05:49:23 vps sshd[231661]: Failed password for root from 85.209.0.16 port 46802 ssh2 Apr 21 05:49:21 vps sshd[231662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.16 user=root Apr 21 05:49:23 vps sshd[231662]: Failed password for root from 85.209.0.16 port 46898 ssh2 Apr 21 05:49:21 vps sshd[231663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.16 user=root Apr 21 05:49:23 vps sshd[231663]: Failed password for root from 85.209.0.16 port 46852 ssh2 ... |
2020-04-21 18:55:41 |
134.209.226.157 | attackbots | Apr 21 10:50:46 vlre-nyc-1 sshd\[19420\]: Invalid user lm from 134.209.226.157 Apr 21 10:50:46 vlre-nyc-1 sshd\[19420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.226.157 Apr 21 10:50:48 vlre-nyc-1 sshd\[19420\]: Failed password for invalid user lm from 134.209.226.157 port 59156 ssh2 Apr 21 10:54:57 vlre-nyc-1 sshd\[19636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.226.157 user=root Apr 21 10:54:59 vlre-nyc-1 sshd\[19636\]: Failed password for root from 134.209.226.157 port 57064 ssh2 ... |
2020-04-21 19:23:33 |
109.160.91.54 | attackbotsspam | email spam |
2020-04-21 19:09:15 |
165.22.94.11 | attackspam | SSH Scan |
2020-04-21 19:16:31 |
139.199.119.76 | attackspam | 2020-04-21T04:50:44.0695271495-001 sshd[10833]: Failed password for invalid user postgres from 139.199.119.76 port 59236 ssh2 2020-04-21T04:53:55.6042241495-001 sshd[11024]: Invalid user hb from 139.199.119.76 port 37268 2020-04-21T04:53:55.6126651495-001 sshd[11024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.119.76 2020-04-21T04:53:55.6042241495-001 sshd[11024]: Invalid user hb from 139.199.119.76 port 37268 2020-04-21T04:53:56.9893151495-001 sshd[11024]: Failed password for invalid user hb from 139.199.119.76 port 37268 ssh2 2020-04-21T04:56:53.4470441495-001 sshd[11136]: Invalid user fw from 139.199.119.76 port 43522 ... |
2020-04-21 18:55:17 |
194.61.24.47 | attack | firewall-block, port(s): 3386/tcp, 3389/tcp |
2020-04-21 19:15:19 |
180.177.117.142 | attackbots | Telnet Server BruteForce Attack |
2020-04-21 19:13:33 |
159.89.162.203 | attackspambots | $f2bV_matches |
2020-04-21 19:29:25 |
49.235.77.83 | attackspam | Apr 21 13:19:06 prox sshd[5584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.77.83 Apr 21 13:19:07 prox sshd[5584]: Failed password for invalid user space from 49.235.77.83 port 47890 ssh2 |
2020-04-21 19:25:41 |
31.128.122.244 | attackspam | Brute-force attempt banned |
2020-04-21 18:52:54 |
128.199.103.239 | attackbots | Apr 21 09:39:07 l03 sshd[2001]: Invalid user y from 128.199.103.239 port 41614 ... |
2020-04-21 19:04:46 |
51.15.68.87 | attackbotsspam | Apr 21 09:53:56 localhost sshd\[28864\]: Invalid user bc from 51.15.68.87 port 35234 Apr 21 09:53:56 localhost sshd\[28864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.68.87 Apr 21 09:53:58 localhost sshd\[28864\]: Failed password for invalid user bc from 51.15.68.87 port 35234 ssh2 ... |
2020-04-21 18:55:53 |
89.210.94.249 | attackspambots | Telnet Server BruteForce Attack |
2020-04-21 19:00:09 |
92.63.194.30 | attack | Unauthorized connection attempt detected from IP address 92.63.194.30 to port 1945 |
2020-04-21 19:25:01 |