City: Werdau
Region: Saxony
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.149.0.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.149.0.253. IN A
;; AUTHORITY SECTION:
. 237 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021803 1800 900 604800 86400
;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 06:28:56 CST 2020
;; MSG SIZE rcvd: 116
Host 253.0.149.80.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 253.0.149.80.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
140.143.93.31 | attackspam | Dec 24 14:17:24 vpn01 sshd[798]: Failed password for news from 140.143.93.31 port 43948 ssh2 ... |
2019-12-24 21:43:05 |
118.71.43.70 | attackbots | 1577171641 - 12/24/2019 08:14:01 Host: 118.71.43.70/118.71.43.70 Port: 445 TCP Blocked |
2019-12-24 21:42:13 |
106.12.46.104 | attack | Dec 24 14:22:47 dedicated sshd[13772]: Invalid user 1QAZ3EDC from 106.12.46.104 port 47558 |
2019-12-24 21:55:45 |
180.254.2.198 | attack | 1577171652 - 12/24/2019 08:14:12 Host: 180.254.2.198/180.254.2.198 Port: 445 TCP Blocked |
2019-12-24 21:38:46 |
119.42.175.200 | attackspambots | Dec 24 13:23:08 server sshd\[14008\]: Invalid user mount1 from 119.42.175.200 Dec 24 13:23:08 server sshd\[14008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200 Dec 24 13:23:09 server sshd\[14008\]: Failed password for invalid user mount1 from 119.42.175.200 port 40230 ssh2 Dec 24 13:35:10 server sshd\[17356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.42.175.200 user=root Dec 24 13:35:12 server sshd\[17356\]: Failed password for root from 119.42.175.200 port 49421 ssh2 ... |
2019-12-24 21:28:05 |
117.102.121.19 | attackspambots | 19/12/24@02:14:07: FAIL: Alarm-Intrusion address from=117.102.121.19 ... |
2019-12-24 21:41:30 |
27.128.229.22 | attackbotsspam | Dec 24 14:12:43 vpn01 sshd[752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.229.22 Dec 24 14:12:45 vpn01 sshd[752]: Failed password for invalid user mallik from 27.128.229.22 port 40122 ssh2 ... |
2019-12-24 21:30:18 |
103.113.158.176 | attackspambots | Dec 24 13:40:12 mail1 sshd\[21450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.158.176 user=dovecot Dec 24 13:40:14 mail1 sshd\[21450\]: Failed password for dovecot from 103.113.158.176 port 2406 ssh2 Dec 24 13:43:54 mail1 sshd\[23086\]: Invalid user ssh from 103.113.158.176 port 41392 Dec 24 13:43:54 mail1 sshd\[23086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.158.176 Dec 24 13:43:56 mail1 sshd\[23086\]: Failed password for invalid user ssh from 103.113.158.176 port 41392 ssh2 ... |
2019-12-24 21:33:18 |
182.61.19.79 | attackbots | Dec 24 08:12:42 silence02 sshd[7627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.19.79 Dec 24 08:12:44 silence02 sshd[7627]: Failed password for invalid user server from 182.61.19.79 port 50082 ssh2 Dec 24 08:13:59 silence02 sshd[7640]: Failed password for root from 182.61.19.79 port 58692 ssh2 |
2019-12-24 21:49:15 |
193.226.218.75 | attackbotsspam | firewall-block, port(s): 2222/tcp |
2019-12-24 22:02:34 |
190.85.15.251 | attack | Dec 24 09:00:20 v22018086721571380 sshd[10627]: Failed password for invalid user 120 from 190.85.15.251 port 34256 ssh2 Dec 24 09:02:21 v22018086721571380 sshd[10731]: Failed password for invalid user schuetzl from 190.85.15.251 port 50685 ssh2 |
2019-12-24 21:48:48 |
14.63.223.226 | attack | Dec 24 07:55:02 game-panel sshd[1224]: Failed password for root from 14.63.223.226 port 39522 ssh2 Dec 24 07:58:26 game-panel sshd[1429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226 Dec 24 07:58:27 game-panel sshd[1429]: Failed password for invalid user home from 14.63.223.226 port 40808 ssh2 |
2019-12-24 21:31:55 |
106.52.169.18 | attackspambots | $f2bV_matches_ltvn |
2019-12-24 21:49:57 |
106.0.6.33 | attackbots | Unauthorized connection attempt detected from IP address 106.0.6.33 to port 445 |
2019-12-24 22:03:49 |
190.60.103.178 | attackspam | email spam |
2019-12-24 21:54:43 |