City: unknown
Region: unknown
Country: Slovakia (SLOVAK Republic)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.136.150.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.136.150.64. IN A
;; AUTHORITY SECTION:
. 241 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 19:43:07 CST 2022
;; MSG SIZE rcvd: 106
Host 64.150.136.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.150.136.94.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.166.129.156 | attackbots | 46.166.129.156 - - \[05/Jul/2020:05:53:26 +0200\] "GET /index.php\?id=ausland%27%2F%2A\&id=%2A%2FUNION%2F%2A\&id=%2A%2FALL%2F%2A\&id=%2A%2FSELECT%2F%2A\&id=%2A%2F4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=4166\&id=CHR%28113%29%7C%7CCHR%2898%29%7C%7CCHR%28122%29%7C%7CCHR%2810 |
2020-07-05 15:10:51 |
| 192.35.168.229 | attackbotsspam |
|
2020-07-05 14:55:25 |
| 51.91.77.103 | attackbotsspam | [ssh] SSH attack |
2020-07-05 15:03:24 |
| 139.186.84.46 | attackbots | Jul 5 08:34:04 serwer sshd\[12551\]: Invalid user postgres from 139.186.84.46 port 37632 Jul 5 08:34:04 serwer sshd\[12551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.84.46 Jul 5 08:34:06 serwer sshd\[12551\]: Failed password for invalid user postgres from 139.186.84.46 port 37632 ssh2 ... |
2020-07-05 14:56:07 |
| 177.183.215.193 | attackbots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-05 14:47:38 |
| 187.108.203.53 | attack | (mod_security) mod_security (id:210492) triggered by 187.108.203.53 (BR/Brazil/ns1.w5.com.br): 5 in the last 3600 secs |
2020-07-05 14:31:06 |
| 185.220.101.5 | attackspambots | Unauthorized connection attempt detected from IP address 185.220.101.5 to port 1883 |
2020-07-05 15:11:54 |
| 185.128.41.50 | attackbotsspam | Unauthorized connection attempt detected from IP address 185.128.41.50 to port 80 [T] |
2020-07-05 14:37:52 |
| 222.186.15.62 | attackspam | SSH login attempts. |
2020-07-05 14:38:23 |
| 218.92.0.215 | attack | Jul 5 07:08:46 scw-6657dc sshd[21224]: Failed password for root from 218.92.0.215 port 21366 ssh2 Jul 5 07:08:46 scw-6657dc sshd[21224]: Failed password for root from 218.92.0.215 port 21366 ssh2 Jul 5 07:08:49 scw-6657dc sshd[21224]: Failed password for root from 218.92.0.215 port 21366 ssh2 ... |
2020-07-05 15:09:08 |
| 115.238.255.145 | attackbotsspam | Icarus honeypot on github |
2020-07-05 14:42:41 |
| 95.167.39.12 | attack | 2020-07-05T07:59:19.739692sd-86998 sshd[21590]: Invalid user dolphin from 95.167.39.12 port 34534 2020-07-05T07:59:19.741923sd-86998 sshd[21590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 2020-07-05T07:59:19.739692sd-86998 sshd[21590]: Invalid user dolphin from 95.167.39.12 port 34534 2020-07-05T07:59:21.754767sd-86998 sshd[21590]: Failed password for invalid user dolphin from 95.167.39.12 port 34534 ssh2 2020-07-05T08:02:46.975832sd-86998 sshd[22245]: Invalid user nfs from 95.167.39.12 port 56876 ... |
2020-07-05 15:08:16 |
| 185.143.72.25 | attack | Jul 5 08:59:54 relay postfix/smtpd\[8339\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 5 09:00:33 relay postfix/smtpd\[8340\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 5 09:01:10 relay postfix/smtpd\[12146\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 5 09:01:53 relay postfix/smtpd\[12086\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 5 09:02:28 relay postfix/smtpd\[12139\]: warning: unknown\[185.143.72.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-05 15:04:31 |
| 124.42.83.34 | attackbots | Jul 4 18:19:15 php1 sshd\[11228\]: Invalid user teste1 from 124.42.83.34 Jul 4 18:19:15 php1 sshd\[11228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.83.34 Jul 4 18:19:17 php1 sshd\[11228\]: Failed password for invalid user teste1 from 124.42.83.34 port 35384 ssh2 Jul 4 18:22:25 php1 sshd\[11452\]: Invalid user vada from 124.42.83.34 Jul 4 18:22:25 php1 sshd\[11452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.83.34 |
2020-07-05 14:53:21 |
| 141.98.81.138 | attackbotsspam | Jul 5 08:37:05 vps647732 sshd[25089]: Failed password for root from 141.98.81.138 port 54278 ssh2 ... |
2020-07-05 14:53:57 |