City: Ruggell
Region: Ruggell
Country: Liechtenstein
Internet Service Provider: unknown
Hostname: unknown
Organization: Telecom Liechtenstein AG
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.66.231.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64847
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.66.231.211. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072400 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 24 23:39:29 CST 2019
;; MSG SIZE rcvd: 117
211.231.66.80.in-addr.arpa domain name pointer 80-66-231-211.dynamic.modem.fl1.li.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
211.231.66.80.in-addr.arpa name = 80-66-231-211.dynamic.modem.fl1.li.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 200.175.185.54 | attack | Invalid user test from 200.175.185.54 port 35612 |
2020-05-13 06:47:02 |
| 213.217.0.131 | attack | May 13 00:09:30 debian-2gb-nbg1-2 kernel: \[11580230.810586\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.131 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=56025 PROTO=TCP SPT=49268 DPT=52000 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-13 06:39:28 |
| 117.60.5.60 | attackspambots | SpamScore above: 10.0 |
2020-05-13 06:27:02 |
| 113.117.123.83 | attackspambots | 2020-05-12T23:13:24.287013 X postfix/smtpd[109691]: lost connection after AUTH from unknown[113.117.123.83] 2020-05-12T23:13:27.400847 X postfix/smtpd[3388352]: lost connection after AUTH from unknown[113.117.123.83] 2020-05-12T23:13:28.746855 X postfix/smtpd[280123]: lost connection after AUTH from unknown[113.117.123.83] |
2020-05-13 06:24:17 |
| 107.180.227.163 | attackbotsspam | 107.180.227.163 - - \[12/May/2020:23:13:00 +0200\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 107.180.227.163 - - \[12/May/2020:23:13:02 +0200\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 107.180.227.163 - - \[12/May/2020:23:13:02 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-05-13 06:41:59 |
| 185.176.27.34 | attack | srv02 Mass scanning activity detected Target: 3185 .. |
2020-05-13 06:25:28 |
| 61.133.232.249 | attackbots | Automatic report BANNED IP |
2020-05-13 06:31:38 |
| 60.28.188.101 | attack | Lines containing failures of 60.28.188.101 May 12 20:43:02 shared03 sshd[21458]: Did not receive identification string from 60.28.188.101 port 39204 May 12 20:50:13 shared03 sshd[23852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.28.188.101 user=r.r May 12 20:50:15 shared03 sshd[23852]: Failed password for r.r from 60.28.188.101 port 42356 ssh2 May 12 20:50:15 shared03 sshd[23852]: Received disconnect from 60.28.188.101 port 42356:11: Normal Shutdown, Thank you for playing [preauth] May 12 20:50:15 shared03 sshd[23852]: Disconnected from authenticating user r.r 60.28.188.101 port 42356 [preauth] May 12 20:58:06 shared03 sshd[27126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.28.188.101 user=r.r May 12 20:58:08 shared03 sshd[27126]: Failed password for r.r from 60.28.188.101 port 49956 ssh2 May 12 20:58:08 shared03 sshd[27126]: Received disconnect from 60.28.188.101 port 4995........ ------------------------------ |
2020-05-13 06:42:36 |
| 164.132.42.32 | attack | Invalid user jason4 from 164.132.42.32 port 49428 |
2020-05-13 06:37:15 |
| 51.89.40.17 | attackspam | May 12 23:11:01 ovpn sshd[20194]: Did not receive identification string from 51.89.40.17 May 12 23:12:22 ovpn sshd[20528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.40.17 user=r.r May 12 23:12:24 ovpn sshd[20528]: Failed password for r.r from 51.89.40.17 port 48256 ssh2 May 12 23:12:24 ovpn sshd[20528]: Received disconnect from 51.89.40.17 port 48256:11: Normal Shutdown, Thank you for playing [preauth] May 12 23:12:24 ovpn sshd[20528]: Disconnected from 51.89.40.17 port 48256 [preauth] May 12 23:13:00 ovpn sshd[20663]: Invalid user syslogs from 51.89.40.17 May 12 23:13:00 ovpn sshd[20663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.40.17 May 12 23:13:03 ovpn sshd[20663]: Failed password for invalid user syslogs from 51.89.40.17 port 57520 ssh2 May 12 23:13:03 ovpn sshd[20663]: Received disconnect from 51.89.40.17 port 57520:11: Normal Shutdown, Thank you for playing [p........ ------------------------------ |
2020-05-13 06:38:17 |
| 165.255.240.52 | attack | Brute forcing RDP port 3389 |
2020-05-13 06:58:05 |
| 185.2.140.155 | attackspam | May 13 05:18:12 itv-usvr-01 sshd[13707]: Invalid user fred from 185.2.140.155 May 13 05:18:12 itv-usvr-01 sshd[13707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.140.155 May 13 05:18:12 itv-usvr-01 sshd[13707]: Invalid user fred from 185.2.140.155 May 13 05:18:14 itv-usvr-01 sshd[13707]: Failed password for invalid user fred from 185.2.140.155 port 53022 ssh2 |
2020-05-13 06:28:49 |
| 192.248.41.94 | attack | 5x Failed Password |
2020-05-13 06:59:18 |
| 117.50.23.52 | attack | [Wed May 13 04:15:56 2020] - DDoS Attack From IP: 117.50.23.52 Port: 58914 |
2020-05-13 06:32:35 |
| 113.188.62.172 | attack | Automatic report - Port Scan Attack |
2020-05-13 06:33:10 |