City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.249.12.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.249.12.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 03:46:43 CST 2025
;; MSG SIZE rcvd: 104
b'Host 64.12.249.6.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 6.249.12.64.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.220.135.10 | attackbotsspam | Oct 19 02:00:41 sachi sshd\[16230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.135.10 user=root Oct 19 02:00:42 sachi sshd\[16230\]: Failed password for root from 177.220.135.10 port 33793 ssh2 Oct 19 02:05:51 sachi sshd\[16663\]: Invalid user celery from 177.220.135.10 Oct 19 02:05:51 sachi sshd\[16663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.135.10 Oct 19 02:05:52 sachi sshd\[16663\]: Failed password for invalid user celery from 177.220.135.10 port 46913 ssh2 |
2019-10-19 20:10:36 |
| 180.250.115.121 | attack | $f2bV_matches |
2019-10-19 20:02:31 |
| 51.75.195.222 | attackspambots | Oct 19 11:37:45 SilenceServices sshd[26429]: Failed password for root from 51.75.195.222 port 49354 ssh2 Oct 19 11:42:10 SilenceServices sshd[27688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.222 Oct 19 11:42:12 SilenceServices sshd[27688]: Failed password for invalid user postgres from 51.75.195.222 port 60644 ssh2 |
2019-10-19 20:00:39 |
| 45.55.35.40 | attack | Oct 19 13:51:43 server sshd\[4223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.35.40 user=root Oct 19 13:51:45 server sshd\[4223\]: Failed password for root from 45.55.35.40 port 50790 ssh2 Oct 19 14:08:13 server sshd\[8406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.35.40 user=root Oct 19 14:08:16 server sshd\[8406\]: Failed password for root from 45.55.35.40 port 45862 ssh2 Oct 19 14:11:43 server sshd\[9421\]: Invalid user arkserver from 45.55.35.40 Oct 19 14:11:43 server sshd\[9421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.35.40 ... |
2019-10-19 20:05:13 |
| 92.222.216.71 | attackbotsspam | Invalid user suporte from 92.222.216.71 port 55536 |
2019-10-19 20:04:41 |
| 122.116.34.136 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/122.116.34.136/ TW - 1H : (114) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TW NAME ASN : ASN3462 IP : 122.116.34.136 CIDR : 122.116.0.0/16 PREFIX COUNT : 390 UNIQUE IP COUNT : 12267520 ATTACKS DETECTED ASN3462 : 1H - 4 3H - 10 6H - 23 12H - 44 24H - 97 DateTime : 2019-10-19 14:05:52 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-19 20:10:04 |
| 218.11.30.20 | attack | Unauthorised access (Oct 19) SRC=218.11.30.20 LEN=40 TTL=49 ID=43607 TCP DPT=8080 WINDOW=43868 SYN Unauthorised access (Oct 19) SRC=218.11.30.20 LEN=40 TTL=49 ID=37053 TCP DPT=8080 WINDOW=43868 SYN Unauthorised access (Oct 17) SRC=218.11.30.20 LEN=40 TTL=49 ID=47523 TCP DPT=8080 WINDOW=43868 SYN Unauthorised access (Oct 16) SRC=218.11.30.20 LEN=40 TTL=49 ID=28411 TCP DPT=8080 WINDOW=43868 SYN Unauthorised access (Oct 16) SRC=218.11.30.20 LEN=40 TTL=49 ID=5400 TCP DPT=8080 WINDOW=40138 SYN Unauthorised access (Oct 15) SRC=218.11.30.20 LEN=40 TTL=49 ID=20272 TCP DPT=8080 WINDOW=43868 SYN |
2019-10-19 20:01:23 |
| 218.92.0.211 | attackbotsspam | Oct 19 14:27:31 eventyay sshd[30035]: Failed password for root from 218.92.0.211 port 46880 ssh2 Oct 19 14:27:34 eventyay sshd[30035]: Failed password for root from 218.92.0.211 port 46880 ssh2 Oct 19 14:27:36 eventyay sshd[30035]: Failed password for root from 218.92.0.211 port 46880 ssh2 ... |
2019-10-19 20:28:37 |
| 167.114.192.162 | attack | Oct 19 14:19:13 eventyay sshd[29935]: Failed password for root from 167.114.192.162 port 36550 ssh2 Oct 19 14:23:04 eventyay sshd[29977]: Failed password for root from 167.114.192.162 port 56170 ssh2 ... |
2019-10-19 20:36:53 |
| 189.15.105.171 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/189.15.105.171/ BR - 1H : (313) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN53006 IP : 189.15.105.171 CIDR : 189.15.0.0/16 PREFIX COUNT : 15 UNIQUE IP COUNT : 599808 ATTACKS DETECTED ASN53006 : 1H - 1 3H - 3 6H - 6 12H - 9 24H - 18 DateTime : 2019-10-19 14:05:35 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-19 20:19:29 |
| 185.40.14.186 | attack | " " |
2019-10-19 20:12:31 |
| 185.176.27.242 | attackspambots | Oct 19 13:58:18 mc1 kernel: \[2772658.915324\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=56373 PROTO=TCP SPT=47834 DPT=43822 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 14:00:17 mc1 kernel: \[2772778.085757\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=63865 PROTO=TCP SPT=47834 DPT=55179 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 14:05:33 mc1 kernel: \[2773093.558103\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=14314 PROTO=TCP SPT=47834 DPT=60117 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-19 20:20:35 |
| 46.101.103.207 | attackspambots | Oct 19 02:01:42 wbs sshd\[13202\]: Invalid user yxcvb from 46.101.103.207 Oct 19 02:01:42 wbs sshd\[13202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.207 Oct 19 02:01:44 wbs sshd\[13202\]: Failed password for invalid user yxcvb from 46.101.103.207 port 50542 ssh2 Oct 19 02:05:43 wbs sshd\[13535\]: Invalid user 123456@qwert from 46.101.103.207 Oct 19 02:05:43 wbs sshd\[13535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.207 |
2019-10-19 20:15:16 |
| 110.43.34.48 | attack | 2019-10-19T13:54:06.025739scmdmz1 sshd\[1993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.34.48 user=root 2019-10-19T13:54:07.753311scmdmz1 sshd\[1993\]: Failed password for root from 110.43.34.48 port 43280 ssh2 2019-10-19T13:59:30.575199scmdmz1 sshd\[2417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.34.48 user=root ... |
2019-10-19 20:01:10 |
| 197.85.191.178 | attack | Automatic report - Banned IP Access |
2019-10-19 20:19:06 |