City: unknown
Region: unknown
Country: Belgium
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.104.45.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.104.45.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022701 1800 900 604800 86400
;; Query time: 299 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 02:11:13 CST 2025
;; MSG SIZE rcvd: 105
Host 99.45.104.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.45.104.94.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.113.115.210 | attackspam | 04/24/2020-23:58:41.707671 176.113.115.210 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-25 12:56:24 |
| 104.248.88.100 | attackspambots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-04-25 12:51:46 |
| 183.65.30.2 | attack | 04/24/2020-23:59:28.895494 183.65.30.2 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-04-25 12:20:47 |
| 106.13.88.196 | attackspambots | Apr 25 05:45:23 ns382633 sshd\[12791\]: Invalid user schmetterling from 106.13.88.196 port 40442 Apr 25 05:45:23 ns382633 sshd\[12791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.88.196 Apr 25 05:45:25 ns382633 sshd\[12791\]: Failed password for invalid user schmetterling from 106.13.88.196 port 40442 ssh2 Apr 25 05:59:05 ns382633 sshd\[14710\]: Invalid user test from 106.13.88.196 port 40766 Apr 25 05:59:05 ns382633 sshd\[14710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.88.196 |
2020-04-25 12:38:00 |
| 180.166.141.58 | attackspam | Apr 25 06:32:33 debian-2gb-nbg1-2 kernel: \[10048094.935811\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.166.141.58 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=237 ID=54165 PROTO=TCP SPT=50029 DPT=56144 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-25 12:45:59 |
| 94.23.160.185 | attackbotsspam | Apr 25 06:12:09 vpn01 sshd[10324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.160.185 Apr 25 06:12:10 vpn01 sshd[10324]: Failed password for invalid user xgridagent from 94.23.160.185 port 46668 ssh2 ... |
2020-04-25 12:30:46 |
| 197.232.19.52 | attack | Apr 24 23:58:53 lanister sshd[21558]: Invalid user abdelsalaam from 197.232.19.52 Apr 24 23:58:53 lanister sshd[21558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.232.19.52 Apr 24 23:58:53 lanister sshd[21558]: Invalid user abdelsalaam from 197.232.19.52 Apr 24 23:58:54 lanister sshd[21558]: Failed password for invalid user abdelsalaam from 197.232.19.52 port 57548 ssh2 |
2020-04-25 12:45:09 |
| 51.91.111.73 | attackbotsspam | Apr 24 23:55:22 NPSTNNYC01T sshd[16492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.111.73 Apr 24 23:55:24 NPSTNNYC01T sshd[16492]: Failed password for invalid user psycho from 51.91.111.73 port 46278 ssh2 Apr 24 23:59:26 NPSTNNYC01T sshd[16826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.111.73 ... |
2020-04-25 12:23:53 |
| 186.206.139.166 | attackspambots | Apr 25 06:23:56 vps647732 sshd[5967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.139.166 Apr 25 06:23:58 vps647732 sshd[5967]: Failed password for invalid user vcsa from 186.206.139.166 port 46640 ssh2 ... |
2020-04-25 12:40:06 |
| 159.203.74.94 | attackspambots | 20/4/24@23:59:23: FAIL: Alarm-Intrusion address from=159.203.74.94 ... |
2020-04-25 12:28:20 |
| 103.3.220.80 | attack | Apr 25 03:59:07 *** sshd[28463]: User root from 103.3.220.80 not allowed because not listed in AllowUsers |
2020-04-25 12:34:51 |
| 218.92.0.138 | attack | 2020-04-25T05:59:21.947626sd-86998 sshd[39117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root 2020-04-25T05:59:23.855189sd-86998 sshd[39117]: Failed password for root from 218.92.0.138 port 19197 ssh2 2020-04-25T05:59:26.639201sd-86998 sshd[39117]: Failed password for root from 218.92.0.138 port 19197 ssh2 2020-04-25T05:59:21.947626sd-86998 sshd[39117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root 2020-04-25T05:59:23.855189sd-86998 sshd[39117]: Failed password for root from 218.92.0.138 port 19197 ssh2 2020-04-25T05:59:26.639201sd-86998 sshd[39117]: Failed password for root from 218.92.0.138 port 19197 ssh2 2020-04-25T05:59:21.947626sd-86998 sshd[39117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root 2020-04-25T05:59:23.855189sd-86998 sshd[39117]: Failed password for root from 218.92.0.138 p ... |
2020-04-25 12:19:07 |
| 111.231.143.71 | attack | $f2bV_matches |
2020-04-25 12:46:29 |
| 27.72.153.16 | attackspam | 2020-04-24T20:59:05.249007-07:00 suse-nuc sshd[16946]: Invalid user admin from 27.72.153.16 port 52031 ... |
2020-04-25 12:39:53 |
| 184.178.172.18 | attackbots | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="...ulli fx |
2020-04-25 12:33:58 |