City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.42.160.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.42.160.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 21:26:07 CST 2025
;; MSG SIZE rcvd: 105
Host 64.160.42.61.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.160.42.61.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.210.136.189 | attackspambots | Oct 5 16:49:14 hostnameproxy sshd[6564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189 user=r.r Oct 5 16:49:14 hostnameproxy sshd[6563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189 user=r.r Oct 5 16:49:14 hostnameproxy sshd[6586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189 user=r.r Oct 5 16:49:14 hostnameproxy sshd[6592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189 user=r.r Oct 5 16:49:14 hostnameproxy sshd[6562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189 user=r.r Oct 5 16:49:14 hostnameproxy sshd[6582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189 user=r.r Oct 5 16:49:14 hostnameproxy sshd[6585]: pam_unix(sshd........ ------------------------------ |
2020-10-07 13:10:36 |
| 5.188.206.199 | attackspambots | Oct 6 02:32:02 xzibhostname postfix/smtpd[4245]: connect from unknown[5.188.206.199] Oct 6 02:32:05 xzibhostname postfix/smtpd[4245]: warning: unknown[5.188.206.199]: SASL PLAIN authentication failed: authentication failure Oct 6 02:32:06 xzibhostname postfix/smtpd[4245]: lost connection after AUTH from unknown[5.188.206.199] Oct 6 02:32:06 xzibhostname postfix/smtpd[4245]: disconnect from unknown[5.188.206.199] ehlo=1 auth=0/1 commands=1/2 Oct 6 02:32:06 xzibhostname postfix/smtpd[5253]: connect from unknown[5.188.206.199] Oct 6 02:32:07 xzibhostname postfix/smtpd[6295]: connect from unknown[5.188.206.199] Oct 6 02:32:08 xzibhostname postfix/smtpd[4245]: connect from unknown[5.188.206.199] Oct 6 02:32:09 xzibhostname postfix/smtpd[5253]: warning: unknown[5.188.206.199]: SASL PLAIN authentication failed: authentication failure Oct 6 02:32:09 xzibhostname postfix/smtpd[5253]: lost connection after AUTH from unknown[5.188.206.199] Oct 6 02:32:09 xzibhostname pos........ ------------------------------- |
2020-10-07 13:23:03 |
| 186.147.160.189 | attackspam | (sshd) Failed SSH login from 186.147.160.189 (CO/Colombia/static-ip-186147160189.cable.net.co): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 7 01:07:37 optimus sshd[22941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.160.189 user=root Oct 7 01:07:39 optimus sshd[22941]: Failed password for root from 186.147.160.189 port 48908 ssh2 Oct 7 01:14:08 optimus sshd[25394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.160.189 user=root Oct 7 01:14:10 optimus sshd[25394]: Failed password for root from 186.147.160.189 port 37952 ssh2 Oct 7 01:16:07 optimus sshd[26196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.160.189 user=root |
2020-10-07 13:19:13 |
| 157.230.143.1 | attackspambots | Oct 5 03:30:36 svapp01 sshd[7982]: User r.r from 157.230.143.1 not allowed because not listed in AllowUsers Oct 5 03:30:36 svapp01 sshd[7982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.143.1 user=r.r Oct 5 03:30:39 svapp01 sshd[7982]: Failed password for invalid user r.r from 157.230.143.1 port 44210 ssh2 Oct 5 03:30:39 svapp01 sshd[7982]: Received disconnect from 157.230.143.1: 11: Bye Bye [preauth] Oct 5 03:39:20 svapp01 sshd[10721]: User r.r from 157.230.143.1 not allowed because not listed in AllowUsers Oct 5 03:39:20 svapp01 sshd[10721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.143.1 user=r.r Oct 5 03:39:22 svapp01 sshd[10721]: Failed password for invalid user r.r from 157.230.143.1 port 50638 ssh2 Oct 5 03:39:22 svapp01 sshd[10721]: Received disconnect from 157.230.143.1: 11: Bye Bye [preauth] Oct 5 03:42:50 svapp01 sshd[11954]: User r.r from 157........ ------------------------------- |
2020-10-07 13:32:02 |
| 12.235.148.58 | spam | There's no information |
2020-10-07 13:49:19 |
| 61.77.161.99 | attack | Port Scan detected! ... |
2020-10-07 13:40:45 |
| 111.207.167.147 | attackspambots | " " |
2020-10-07 13:20:31 |
| 200.146.196.100 | attackbotsspam | Oct 6 06:21:07 lola sshd[10274]: reveeclipse mapping checking getaddrinfo for 200-146-196-100.static.ctbctelecom.com.br [200.146.196.100] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 6 06:21:07 lola sshd[10274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.196.100 user=r.r Oct 6 06:21:09 lola sshd[10274]: Failed password for r.r from 200.146.196.100 port 35336 ssh2 Oct 6 06:21:09 lola sshd[10274]: Received disconnect from 200.146.196.100: 11: Bye Bye [preauth] Oct 6 06:24:43 lola sshd[10351]: reveeclipse mapping checking getaddrinfo for 200-146-196-100.static.ctbctelecom.com.br [200.146.196.100] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 6 06:24:43 lola sshd[10351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.196.100 user=r.r Oct 6 06:24:45 lola sshd[10351]: Failed password for r.r from 200.146.196.100 port 53922 ssh2 Oct 6 06:24:45 lola sshd[10351]: Received disconn........ ------------------------------- |
2020-10-07 13:50:23 |
| 152.136.173.58 | attackbotsspam | Oct 7 01:53:19 ovpn sshd\[787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.173.58 user=root Oct 7 01:53:22 ovpn sshd\[787\]: Failed password for root from 152.136.173.58 port 34274 ssh2 Oct 7 01:58:24 ovpn sshd\[2050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.173.58 user=root Oct 7 01:58:27 ovpn sshd\[2050\]: Failed password for root from 152.136.173.58 port 59568 ssh2 Oct 7 02:02:31 ovpn sshd\[3125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.173.58 user=root |
2020-10-07 13:49:38 |
| 35.232.144.28 | attackspambots | Multiple SSH authentication failures from 35.232.144.28 |
2020-10-07 13:20:18 |
| 123.206.53.230 | attack | Oct 7 05:21:08 ip-172-31-61-156 sshd[13967]: Failed password for root from 123.206.53.230 port 55890 ssh2 Oct 7 05:21:06 ip-172-31-61-156 sshd[13967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.53.230 user=root Oct 7 05:21:08 ip-172-31-61-156 sshd[13967]: Failed password for root from 123.206.53.230 port 55890 ssh2 Oct 7 05:25:55 ip-172-31-61-156 sshd[14136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.53.230 user=root Oct 7 05:25:57 ip-172-31-61-156 sshd[14136]: Failed password for root from 123.206.53.230 port 58518 ssh2 ... |
2020-10-07 13:42:58 |
| 74.220.219.186 | attackbotsspam | Trolling for resource vulnerabilities |
2020-10-07 13:42:36 |
| 2a01:4f8:201:62f5::2 | attackbotsspam | 20 attempts against mh-misbehave-ban on cedar |
2020-10-07 13:22:05 |
| 51.68.196.163 | attackbotsspam | Oct 7 05:24:00 fhem-rasp sshd[13504]: Failed password for root from 51.68.196.163 port 48382 ssh2 Oct 7 05:24:00 fhem-rasp sshd[13504]: Disconnected from authenticating user root 51.68.196.163 port 48382 [preauth] ... |
2020-10-07 13:37:06 |
| 94.176.205.186 | attackspambots | (Oct 7) LEN=40 TTL=243 ID=59952 DF TCP DPT=23 WINDOW=14600 SYN (Oct 7) LEN=40 TTL=243 ID=63953 DF TCP DPT=23 WINDOW=14600 SYN (Oct 7) LEN=40 TTL=243 ID=57552 DF TCP DPT=23 WINDOW=14600 SYN (Oct 7) LEN=40 TTL=243 ID=22302 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=20461 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=39357 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=54940 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=28578 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=22788 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=43647 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=25005 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=41960 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=6593 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=37427 DF TCP DPT=23 WINDOW=14600 SYN (Oct 6) LEN=40 TTL=243 ID=33914 DF TCP DPT=23 WINDOW=14600 S... |
2020-10-07 13:15:00 |