City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.99.245.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.99.245.255. IN A
;; AUTHORITY SECTION:
. 528 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010702 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 12:44:56 CST 2022
;; MSG SIZE rcvd: 106
Host 255.245.99.64.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 255.245.99.64.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 137.119.55.25 | attackbotsspam | 2020-10-05T13:23:57.149844sorsha.thespaminator.com sshd[22923]: Invalid user pi from 137.119.55.25 port 45068 2020-10-05T13:23:57.219381sorsha.thespaminator.com sshd[22921]: Invalid user pi from 137.119.55.25 port 45160 ... |
2020-10-06 04:27:07 |
| 112.133.192.86 | attackspambots | Brute-force attempt banned |
2020-10-06 04:42:38 |
| 106.75.148.111 | attackbots | Oct 5 05:09:07 onepixel sshd[684707]: Failed password for root from 106.75.148.111 port 47396 ssh2 Oct 5 05:11:02 onepixel sshd[685165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111 user=root Oct 5 05:11:04 onepixel sshd[685165]: Failed password for root from 106.75.148.111 port 43614 ssh2 Oct 5 05:13:03 onepixel sshd[685487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111 user=root Oct 5 05:13:05 onepixel sshd[685487]: Failed password for root from 106.75.148.111 port 39826 ssh2 |
2020-10-06 04:27:48 |
| 175.198.80.24 | attack | Brute-force attempt banned |
2020-10-06 04:25:13 |
| 112.85.42.184 | attack | Oct 5 22:13:39 db sshd[22411]: User root from 112.85.42.184 not allowed because none of user's groups are listed in AllowGroups ... |
2020-10-06 04:22:30 |
| 69.194.15.75 | attack | (sshd) Failed SSH login from 69.194.15.75 (US/United States/69.194.15.75.16clouds.com): 5 in the last 3600 secs |
2020-10-06 04:21:16 |
| 206.189.142.144 | attackspam | 2020-10-04T20:19:40.164581git sshd[52848]: Unable to negotiate with 206.189.142.144 port 58508: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2020-10-04T20:22:40.678999git sshd[52859]: Connection from 206.189.142.144 port 40310 on 138.197.214.51 port 22 rdomain "" 2020-10-04T20:22:40.903511git sshd[52859]: Unable to negotiate with 206.189.142.144 port 40310: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2020-10-04T20:25:45.496633git sshd[52877]: Connection from 206.189.142.144 port 50340 on 138.197.214.51 port 22 rdomain "" 2020-10-04T20:25:45.719524git sshd[52877]: Unable to negotiate with 206.189.142.144 port 50340: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2020-10-04 ... |
2020-10-06 04:24:39 |
| 220.85.104.202 | attack | SSH login attempts. |
2020-10-06 04:28:17 |
| 187.101.140.232 | attackbotsspam | 445/tcp 1433/tcp... [2020-08-28/10-04]7pkt,2pt.(tcp) |
2020-10-06 04:17:52 |
| 124.31.204.119 | attackbots | 1433/tcp 445/tcp... [2020-09-10/10-04]7pkt,2pt.(tcp) |
2020-10-06 04:22:16 |
| 104.206.128.74 | attackspambots |
|
2020-10-06 04:12:44 |
| 193.70.38.187 | attackspam | Oct 5 22:35:32 haigwepa sshd[26004]: Failed password for root from 193.70.38.187 port 35094 ssh2 ... |
2020-10-06 04:41:59 |
| 210.245.52.91 | attackbots | Unauthorized connection attempt from IP address 210.245.52.91 on Port 445(SMB) |
2020-10-06 04:14:07 |
| 40.73.77.193 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-10-06 04:36:41 |
| 134.175.165.186 | attack | Oct 6 03:02:27 itv-usvr-02 sshd[1585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.165.186 user=root Oct 6 03:07:00 itv-usvr-02 sshd[1747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.165.186 user=root Oct 6 03:11:34 itv-usvr-02 sshd[1991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.165.186 user=root |
2020-10-06 04:40:33 |