City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.158.80.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.158.80.94. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:53:44 CST 2025
;; MSG SIZE rcvd: 104
b'Host 94.80.158.6.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 6.158.80.94.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.61.49.107 | attackbots | Oct 9 04:45:05 ns382633 sshd\[8179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107 user=root Oct 9 04:45:07 ns382633 sshd\[8179\]: Failed password for root from 182.61.49.107 port 59850 ssh2 Oct 9 04:52:23 ns382633 sshd\[9145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107 user=root Oct 9 04:52:24 ns382633 sshd\[9145\]: Failed password for root from 182.61.49.107 port 51430 ssh2 Oct 9 04:56:45 ns382633 sshd\[9784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.107 user=root |
2020-10-09 12:24:20 |
| 45.150.206.113 | attack | Oct 9 06:20:30 galaxy event: galaxy/lswi: smtp: studie@wi.uni-potsdam.de [45.150.206.113] authentication failure using internet password Oct 9 06:20:33 galaxy event: galaxy/lswi: smtp: studie [45.150.206.113] authentication failure using internet password Oct 9 06:22:52 galaxy event: galaxy/lswi: smtp: sandy.eggert@wi.uni-potsdam.de [45.150.206.113] authentication failure using internet password Oct 9 06:22:54 galaxy event: galaxy/lswi: smtp: sandy.eggert [45.150.206.113] authentication failure using internet password Oct 9 06:23:14 galaxy event: galaxy/lswi: smtp: bmeuthrath@wi.uni-potsdam.de [45.150.206.113] authentication failure using internet password ... |
2020-10-09 12:25:01 |
| 45.168.25.40 | attackbotsspam | 20/10/8@16:48:25: FAIL: Alarm-Intrusion address from=45.168.25.40 ... |
2020-10-09 12:52:10 |
| 222.186.42.213 | attackbotsspam | (sshd) Failed SSH login from 222.186.42.213 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 9 00:18:03 server sshd[26688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root Oct 9 00:18:03 server sshd[26690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root Oct 9 00:18:05 server sshd[26688]: Failed password for root from 222.186.42.213 port 11835 ssh2 Oct 9 00:18:05 server sshd[26690]: Failed password for root from 222.186.42.213 port 42872 ssh2 Oct 9 00:18:07 server sshd[26688]: Failed password for root from 222.186.42.213 port 11835 ssh2 |
2020-10-09 12:18:57 |
| 146.56.201.34 | attackspambots | Scanned 3 times in the last 24 hours on port 22 |
2020-10-09 12:19:35 |
| 116.1.180.22 | attackspambots | Oct 9 04:40:42 santamaria sshd\[10570\]: Invalid user nagios from 116.1.180.22 Oct 9 04:40:42 santamaria sshd\[10570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.180.22 Oct 9 04:40:44 santamaria sshd\[10570\]: Failed password for invalid user nagios from 116.1.180.22 port 35552 ssh2 ... |
2020-10-09 12:50:07 |
| 106.12.25.96 | attackbots | Oct 8 18:19:15 wbs sshd\[28619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.25.96 user=root Oct 8 18:19:17 wbs sshd\[28619\]: Failed password for root from 106.12.25.96 port 57964 ssh2 Oct 8 18:21:22 wbs sshd\[28802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.25.96 user=root Oct 8 18:21:24 wbs sshd\[28802\]: Failed password for root from 106.12.25.96 port 56378 ssh2 Oct 8 18:23:23 wbs sshd\[28939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.25.96 user=root |
2020-10-09 12:47:03 |
| 157.245.211.180 | attackspambots | [ssh] SSH attack |
2020-10-09 12:44:42 |
| 188.166.247.82 | attackbotsspam | SSH bruteforce |
2020-10-09 12:32:35 |
| 211.87.178.161 | attack | 2020-10-09T03:49:28.105105abusebot-4.cloudsearch.cf sshd[23082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.87.178.161 user=root 2020-10-09T03:49:30.205035abusebot-4.cloudsearch.cf sshd[23082]: Failed password for root from 211.87.178.161 port 57626 ssh2 2020-10-09T03:51:23.457211abusebot-4.cloudsearch.cf sshd[23091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.87.178.161 user=root 2020-10-09T03:51:25.347935abusebot-4.cloudsearch.cf sshd[23091]: Failed password for root from 211.87.178.161 port 56794 ssh2 2020-10-09T03:53:11.772808abusebot-4.cloudsearch.cf sshd[23096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.87.178.161 user=root 2020-10-09T03:53:13.488162abusebot-4.cloudsearch.cf sshd[23096]: Failed password for root from 211.87.178.161 port 55508 ssh2 2020-10-09T03:55:04.453150abusebot-4.cloudsearch.cf sshd[23191]: pam_unix(sshd:auth): ... |
2020-10-09 12:26:50 |
| 61.177.172.104 | attackspambots | Oct 9 04:30:37 ip-172-31-16-56 sshd\[26153\]: Failed password for root from 61.177.172.104 port 5178 ssh2\ Oct 9 04:30:47 ip-172-31-16-56 sshd\[26153\]: Failed password for root from 61.177.172.104 port 5178 ssh2\ Oct 9 04:30:50 ip-172-31-16-56 sshd\[26153\]: Failed password for root from 61.177.172.104 port 5178 ssh2\ Oct 9 04:31:05 ip-172-31-16-56 sshd\[26160\]: Failed password for root from 61.177.172.104 port 17378 ssh2\ Oct 9 04:31:27 ip-172-31-16-56 sshd\[26172\]: Failed password for root from 61.177.172.104 port 19526 ssh2\ |
2020-10-09 12:37:51 |
| 218.92.0.246 | attackspam | Oct 9 06:25:07 santamaria sshd\[12144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246 user=root Oct 9 06:25:08 santamaria sshd\[12144\]: Failed password for root from 218.92.0.246 port 22718 ssh2 Oct 9 06:25:26 santamaria sshd\[12146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246 user=root ... |
2020-10-09 12:29:30 |
| 180.69.27.217 | attackspam | repeated SSH login attempts |
2020-10-09 12:12:09 |
| 222.186.180.130 | attack | Oct 9 06:21:40 abendstille sshd\[20977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root Oct 9 06:21:42 abendstille sshd\[20977\]: Failed password for root from 222.186.180.130 port 41235 ssh2 Oct 9 06:21:49 abendstille sshd\[21125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root Oct 9 06:21:51 abendstille sshd\[21125\]: Failed password for root from 222.186.180.130 port 47022 ssh2 Oct 9 06:21:53 abendstille sshd\[21125\]: Failed password for root from 222.186.180.130 port 47022 ssh2 ... |
2020-10-09 12:27:25 |
| 218.92.0.248 | attackspambots | Oct 9 06:41:23 eventyay sshd[17568]: Failed password for root from 218.92.0.248 port 56545 ssh2 Oct 9 06:41:27 eventyay sshd[17568]: Failed password for root from 218.92.0.248 port 56545 ssh2 Oct 9 06:41:30 eventyay sshd[17568]: Failed password for root from 218.92.0.248 port 56545 ssh2 Oct 9 06:41:36 eventyay sshd[17568]: error: maximum authentication attempts exceeded for root from 218.92.0.248 port 56545 ssh2 [preauth] ... |
2020-10-09 12:43:34 |