City: unknown
Region: unknown
Country: Romania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.196.112.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.196.112.126. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:55:30 CST 2025
;; MSG SIZE rcvd: 107
126.112.196.81.in-addr.arpa domain name pointer 81-196-112-126.rdsnet.ro.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
126.112.196.81.in-addr.arpa name = 81-196-112-126.rdsnet.ro.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.77.62.20 | attack | Sep 7 18:45:05 dev0-dcde-rnet sshd[30149]: Failed password for root from 218.77.62.20 port 45090 ssh2 Sep 7 18:51:13 dev0-dcde-rnet sshd[30258]: Failed password for root from 218.77.62.20 port 40912 ssh2 |
2020-09-08 06:31:29 |
| 106.12.87.149 | attackbotsspam | Sep 7 20:11:51 buvik sshd[3497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.149 user=root Sep 7 20:11:52 buvik sshd[3497]: Failed password for root from 106.12.87.149 port 50796 ssh2 Sep 7 20:13:17 buvik sshd[3621]: Invalid user play from 106.12.87.149 ... |
2020-09-08 06:08:34 |
| 5.157.52.80 | attackbotsspam | Unauthorized access detected from black listed ip! |
2020-09-08 06:20:47 |
| 213.230.110.107 | attack | Sep 7 16:52:46 rush sshd[741]: Failed password for root from 213.230.110.107 port 44286 ssh2 Sep 7 16:52:57 rush sshd[741]: error: maximum authentication attempts exceeded for root from 213.230.110.107 port 44286 ssh2 [preauth] Sep 7 16:53:01 rush sshd[743]: Failed password for root from 213.230.110.107 port 45322 ssh2 ... |
2020-09-08 06:45:31 |
| 200.194.47.250 | attackbots | Automatic report - Port Scan Attack |
2020-09-08 06:23:03 |
| 185.139.137.34 | attackbotsspam | Automatic report - Port Scan Attack |
2020-09-08 06:21:11 |
| 217.107.126.179 | attackbots | wp-login.php, /wp-content/plugins/wp-file-manager/readme.txt, administrator/index.php |
2020-09-08 06:31:04 |
| 45.142.120.20 | attackspam | Sep 8 00:34:29 v22019058497090703 postfix/smtpd[15916]: warning: unknown[45.142.120.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 8 00:35:08 v22019058497090703 postfix/smtpd[12711]: warning: unknown[45.142.120.20]: SASL LOGIN authentication failed: VXNlcm5hbWU6 Sep 8 00:35:47 v22019058497090703 postfix/smtpd[15916]: warning: unknown[45.142.120.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-08 06:41:02 |
| 54.37.158.218 | attack | Sep 7 20:54:17 OPSO sshd\[9635\]: Invalid user dnion from 54.37.158.218 port 36886 Sep 7 20:54:17 OPSO sshd\[9635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.158.218 Sep 7 20:54:19 OPSO sshd\[9635\]: Failed password for invalid user dnion from 54.37.158.218 port 36886 ssh2 Sep 7 20:57:26 OPSO sshd\[10142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.158.218 user=root Sep 7 20:57:28 OPSO sshd\[10142\]: Failed password for root from 54.37.158.218 port 38831 ssh2 |
2020-09-08 06:08:57 |
| 106.13.189.172 | attack | Sep 7 18:36:00 ns382633 sshd\[7235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.172 user=root Sep 7 18:36:01 ns382633 sshd\[7235\]: Failed password for root from 106.13.189.172 port 39954 ssh2 Sep 7 18:53:37 ns382633 sshd\[10219\]: Invalid user temp from 106.13.189.172 port 42114 Sep 7 18:53:37 ns382633 sshd\[10219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.172 Sep 7 18:53:38 ns382633 sshd\[10219\]: Failed password for invalid user temp from 106.13.189.172 port 42114 ssh2 |
2020-09-08 06:19:29 |
| 91.204.199.73 | attack |
|
2020-09-08 06:22:30 |
| 190.186.42.130 | attack | Sep 7 20:01:27 rocket sshd[21396]: Failed password for root from 190.186.42.130 port 8061 ssh2 Sep 7 20:03:31 rocket sshd[21572]: Failed password for root from 190.186.42.130 port 54516 ssh2 ... |
2020-09-08 06:28:59 |
| 159.65.155.255 | attackspam | Sep 7 18:57:47 l02a sshd[32078]: Invalid user postgres from 159.65.155.255 Sep 7 18:57:47 l02a sshd[32078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255 Sep 7 18:57:47 l02a sshd[32078]: Invalid user postgres from 159.65.155.255 Sep 7 18:57:49 l02a sshd[32078]: Failed password for invalid user postgres from 159.65.155.255 port 47952 ssh2 |
2020-09-08 06:13:36 |
| 212.70.149.68 | attackspambots | 2020-09-08T00:13:15.086303web.dutchmasterserver.nl postfix/smtps/smtpd[1780252]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-09-08T00:15:21.200241web.dutchmasterserver.nl postfix/smtps/smtpd[1780252]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-09-08T00:17:29.302306web.dutchmasterserver.nl postfix/smtps/smtpd[1780252]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-09-08T00:19:35.134253web.dutchmasterserver.nl postfix/smtps/smtpd[1780252]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-09-08T00:21:40.371566web.dutchmasterserver.nl postfix/smtps/smtpd[1780252]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-08 06:31:58 |
| 159.89.162.217 | attackbotsspam | [munged]::443 159.89.162.217 - - [07/Sep/2020:19:54:46 +0200] "POST /[munged]: HTTP/1.1" 200 9195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-08 06:08:05 |