City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.5.80.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.5.80.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 12:01:31 CST 2025
;; MSG SIZE rcvd: 104
Host 149.80.5.66.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.80.5.66.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 148.70.134.52 | attack | 2019-12-09T08:31:15.818954abusebot-6.cloudsearch.cf sshd\[28359\]: Invalid user php5 from 148.70.134.52 port 50096 |
2019-12-09 17:25:51 |
| 188.166.18.69 | attackspam | 188.166.18.69 - - \[09/Dec/2019:09:14:23 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 188.166.18.69 - - \[09/Dec/2019:09:14:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 188.166.18.69 - - \[09/Dec/2019:09:14:25 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-12-09 17:08:54 |
| 62.234.99.172 | attackbotsspam | Dec 9 09:03:26 pi sshd\[12116\]: Failed password for www-data from 62.234.99.172 port 46070 ssh2 Dec 9 09:11:21 pi sshd\[12628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.99.172 user=root Dec 9 09:11:23 pi sshd\[12628\]: Failed password for root from 62.234.99.172 port 46136 ssh2 Dec 9 09:19:17 pi sshd\[13132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.99.172 user=root Dec 9 09:19:20 pi sshd\[13132\]: Failed password for root from 62.234.99.172 port 46199 ssh2 ... |
2019-12-09 17:24:27 |
| 37.139.4.138 | attack | SSH Brute-Force reported by Fail2Ban |
2019-12-09 17:23:34 |
| 41.41.67.69 | attackspam | 10 attempts against mh-misc-ban on comet.magehost.pro |
2019-12-09 17:27:58 |
| 157.230.55.177 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-09 17:39:00 |
| 92.118.37.55 | attack | 12/09/2019-03:55:51.276422 92.118.37.55 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-12-09 17:00:54 |
| 45.82.153.82 | attackspambots | 2019-12-09 09:46:47 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data \(set_id=info@orogest.it\) 2019-12-09 09:46:57 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data 2019-12-09 09:47:08 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data 2019-12-09 09:47:15 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data 2019-12-09 09:47:29 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data |
2019-12-09 17:25:28 |
| 192.241.165.27 | attack | Dec 9 09:17:20 server2 sshd\[29784\]: User root from dbsip.ligou.me not allowed because not listed in AllowUsers Dec 9 09:17:21 server2 sshd\[29786\]: Invalid user DUP from 192.241.165.27 Dec 9 09:17:22 server2 sshd\[29788\]: User root from dbsip.ligou.me not allowed because not listed in AllowUsers Dec 9 09:17:23 server2 sshd\[29790\]: User root from dbsip.ligou.me not allowed because not listed in AllowUsers Dec 9 09:17:23 server2 sshd\[29792\]: User root from dbsip.ligou.me not allowed because not listed in AllowUsers Dec 9 09:17:24 server2 sshd\[29794\]: User root from dbsip.ligou.me not allowed because not listed in AllowUsers |
2019-12-09 16:59:19 |
| 95.29.97.3 | attackspambots | Dec 9 11:40:15 server sshd\[14397\]: Invalid user hlouthan from 95.29.97.3 Dec 9 11:40:15 server sshd\[14397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-29-97-3.broadband.corbina.ru Dec 9 11:40:17 server sshd\[14397\]: Failed password for invalid user hlouthan from 95.29.97.3 port 36024 ssh2 Dec 9 11:50:24 server sshd\[17356\]: Invalid user horikawa from 95.29.97.3 Dec 9 11:50:24 server sshd\[17356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-29-97-3.broadband.corbina.ru ... |
2019-12-09 17:25:09 |
| 201.72.238.179 | attack | 2019-12-09T08:40:38.025887abusebot-8.cloudsearch.cf sshd\[31935\]: Invalid user lene from 201.72.238.179 port 33840 |
2019-12-09 17:08:19 |
| 189.26.85.253 | attackbots | Host Scan |
2019-12-09 17:19:03 |
| 222.186.175.212 | attackbots | Dec 9 09:51:16 minden010 sshd[5608]: Failed password for root from 222.186.175.212 port 55682 ssh2 Dec 9 09:51:20 minden010 sshd[5608]: Failed password for root from 222.186.175.212 port 55682 ssh2 Dec 9 09:51:23 minden010 sshd[5608]: Failed password for root from 222.186.175.212 port 55682 ssh2 Dec 9 09:51:27 minden010 sshd[5608]: Failed password for root from 222.186.175.212 port 55682 ssh2 ... |
2019-12-09 17:11:39 |
| 128.199.180.123 | attackspambots | WordPress login Brute force / Web App Attack on client site. |
2019-12-09 17:15:58 |
| 62.234.156.221 | attack | $f2bV_matches |
2019-12-09 17:05:05 |