City: unknown
Region: unknown
Country: Spain
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.91.83.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.91.83.249. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:30:24 CST 2025
;; MSG SIZE rcvd: 105
249.83.91.80.in-addr.arpa domain name pointer srv249.baymasalt.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.83.91.80.in-addr.arpa name = srv249.baymasalt.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.99.244.45 | attack |
|
2020-08-15 22:20:59 |
| 192.3.73.158 | attack | Brute-force attempt banned |
2020-08-15 21:57:51 |
| 78.96.248.188 | attackbots | Automatic report - Port Scan Attack |
2020-08-15 22:16:52 |
| 222.186.175.23 | attackbotsspam | 2020-08-15T14:24:53.015216shield sshd\[26577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root 2020-08-15T14:24:55.050414shield sshd\[26577\]: Failed password for root from 222.186.175.23 port 15189 ssh2 2020-08-15T14:24:58.002392shield sshd\[26577\]: Failed password for root from 222.186.175.23 port 15189 ssh2 2020-08-15T14:25:00.644220shield sshd\[26577\]: Failed password for root from 222.186.175.23 port 15189 ssh2 2020-08-15T14:25:03.163353shield sshd\[26585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root |
2020-08-15 22:28:14 |
| 106.12.105.130 | attackspam | Aug 15 05:24:02 propaganda sshd[7344]: Connection from 106.12.105.130 port 51288 on 10.0.0.161 port 22 rdomain "" Aug 15 05:24:02 propaganda sshd[7344]: Connection closed by 106.12.105.130 port 51288 [preauth] |
2020-08-15 22:04:30 |
| 78.128.113.116 | attackbots | Aug 15 15:35:47 galaxy event: galaxy/lswi: smtp: norbert.gronau@lswi.de [78.128.113.116] authentication failure using internet password Aug 15 15:35:49 galaxy event: galaxy/lswi: smtp: norbert.gronau [78.128.113.116] authentication failure using internet password Aug 15 15:43:57 galaxy event: galaxy/lswi: smtp: cbrockmann@lswi.de [78.128.113.116] authentication failure using internet password Aug 15 15:43:59 galaxy event: galaxy/lswi: smtp: cbrockmann [78.128.113.116] authentication failure using internet password Aug 15 15:45:12 galaxy event: galaxy/lswi: smtp: cglaschke@lswi.de [78.128.113.116] authentication failure using internet password ... |
2020-08-15 21:49:37 |
| 14.17.114.203 | attackbotsspam | Lines containing failures of 14.17.114.203 Aug 12 10:24:56 nextcloud sshd[5890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.17.114.203 user=r.r Aug 12 10:24:58 nextcloud sshd[5890]: Failed password for r.r from 14.17.114.203 port 55089 ssh2 Aug 12 10:24:59 nextcloud sshd[5890]: Received disconnect from 14.17.114.203 port 55089:11: Bye Bye [preauth] Aug 12 10:24:59 nextcloud sshd[5890]: Disconnected from authenticating user r.r 14.17.114.203 port 55089 [preauth] Aug 12 10:36:45 nextcloud sshd[8048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.17.114.203 user=r.r Aug 12 10:36:47 nextcloud sshd[8048]: Failed password for r.r from 14.17.114.203 port 50818 ssh2 Aug 12 10:36:49 nextcloud sshd[8048]: Received disconnect from 14.17.114.203 port 50818:11: Bye Bye [preauth] Aug 12 10:36:49 nextcloud sshd[8048]: Disconnected from authenticating user r.r 14.17.114.203 port 50818 [preauth........ ------------------------------ |
2020-08-15 21:48:53 |
| 80.82.77.33 | attack | [DoS Attack: TCP/UDP Chargen] from source: 80.82.77.33, port 29921, Saturday, August 08, 2020 20:19:37 |
2020-08-15 22:27:36 |
| 112.194.178.195 | attackspam | Lines containing failures of 112.194.178.195 Aug 15 03:43:54 shared05 sshd[25381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.194.178.195 user=r.r Aug 15 03:43:56 shared05 sshd[25381]: Failed password for r.r from 112.194.178.195 port 52108 ssh2 Aug 15 03:43:56 shared05 sshd[25381]: Received disconnect from 112.194.178.195 port 52108:11: Bye Bye [preauth] Aug 15 03:43:56 shared05 sshd[25381]: Disconnected from authenticating user r.r 112.194.178.195 port 52108 [preauth] Aug 15 03:50:18 shared05 sshd[27692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.194.178.195 user=r.r Aug 15 03:50:20 shared05 sshd[27692]: Failed password for r.r from 112.194.178.195 port 39531 ssh2 Aug 15 03:50:20 shared05 sshd[27692]: Received disconnect from 112.194.178.195 port 39531:11: Bye Bye [preauth] Aug 15 03:50:20 shared05 sshd[27692]: Disconnected from authenticating user r.r 112.194.178.195 p........ ------------------------------ |
2020-08-15 22:19:28 |
| 218.92.0.198 | attackbotsspam | 2020-08-15T16:10:47.860489rem.lavrinenko.info sshd[12674]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-15T16:11:55.492432rem.lavrinenko.info sshd[12677]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-15T16:13:03.134663rem.lavrinenko.info sshd[12678]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-15T16:14:13.669503rem.lavrinenko.info sshd[12681]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-15T16:15:24.201656rem.lavrinenko.info sshd[12683]: refused connect from 218.92.0.198 (218.92.0.198) ... |
2020-08-15 22:20:41 |
| 51.89.232.183 | attackbots | Aug 15 15:25:29 ip106 sshd[8803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.232.183 Aug 15 15:25:31 ip106 sshd[8803]: Failed password for invalid user mehrdad from 51.89.232.183 port 52422 ssh2 ... |
2020-08-15 21:54:15 |
| 162.243.170.252 | attackbots | Aug 15 16:06:32 server sshd[2235]: Failed password for root from 162.243.170.252 port 40596 ssh2 Aug 15 16:10:03 server sshd[6936]: Failed password for root from 162.243.170.252 port 56882 ssh2 Aug 15 16:11:08 server sshd[8517]: Failed password for root from 162.243.170.252 port 45664 ssh2 |
2020-08-15 22:17:20 |
| 106.13.201.158 | attackbots | bruteforce detected |
2020-08-15 22:06:18 |
| 49.88.112.60 | attackbotsspam | Aug 15 15:24:12 server sshd[43683]: Failed password for root from 49.88.112.60 port 35724 ssh2 Aug 15 15:24:14 server sshd[43683]: Failed password for root from 49.88.112.60 port 35724 ssh2 Aug 15 15:24:17 server sshd[43683]: Failed password for root from 49.88.112.60 port 35724 ssh2 |
2020-08-15 22:17:32 |
| 106.13.230.219 | attack | Aug 15 14:25:59 vps639187 sshd\[13587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219 user=root Aug 15 14:26:01 vps639187 sshd\[13587\]: Failed password for root from 106.13.230.219 port 60404 ssh2 Aug 15 14:35:23 vps639187 sshd\[13775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219 user=root ... |
2020-08-15 22:24:22 |