City: unknown
Region: unknown
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.239.121.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.239.121.134. IN A
;; AUTHORITY SECTION:
. 586 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011100 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 21:01:35 CST 2023
;; MSG SIZE rcvd: 107
Host 134.121.239.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.121.239.94.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
50.63.166.50 | attack | 50.63.166.50 - - [06/Nov/2019:08:37:56 +0100] "POST /wp-login.php HTTP/1.1" 200 2112 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 50.63.166.50 - - [06/Nov/2019:08:37:57 +0100] "POST /wp-login.php HTTP/1.1" 200 2093 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-11-06 17:54:20 |
36.155.113.218 | attackbotsspam | Nov 6 09:50:11 [host] sshd[13394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.218 user=root Nov 6 09:50:13 [host] sshd[13394]: Failed password for root from 36.155.113.218 port 49561 ssh2 Nov 6 09:55:05 [host] sshd[13453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.218 user=root |
2019-11-06 17:42:10 |
103.17.55.200 | attackbotsspam | SSH Brute-Force attacks |
2019-11-06 17:47:21 |
182.61.179.75 | attackbotsspam | Nov 6 08:58:01 hcbbdb sshd\[29001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75 user=root Nov 6 08:58:03 hcbbdb sshd\[29001\]: Failed password for root from 182.61.179.75 port 25248 ssh2 Nov 6 09:02:29 hcbbdb sshd\[29430\]: Invalid user di from 182.61.179.75 Nov 6 09:02:29 hcbbdb sshd\[29430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75 Nov 6 09:02:31 hcbbdb sshd\[29430\]: Failed password for invalid user di from 182.61.179.75 port 63422 ssh2 |
2019-11-06 17:34:27 |
61.41.159.29 | attackspambots | Nov 6 09:29:46 venus sshd\[845\]: Invalid user guest from 61.41.159.29 port 55780 Nov 6 09:29:46 venus sshd\[845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.41.159.29 Nov 6 09:29:48 venus sshd\[845\]: Failed password for invalid user guest from 61.41.159.29 port 55780 ssh2 ... |
2019-11-06 18:14:01 |
220.132.245.14 | attack | SMB Server BruteForce Attack |
2019-11-06 18:11:28 |
113.125.25.73 | attackspambots | Nov 5 19:31:36 srv3 sshd\[6706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.25.73 user=root Nov 5 19:31:38 srv3 sshd\[6706\]: Failed password for root from 113.125.25.73 port 60578 ssh2 Nov 5 19:36:13 srv3 sshd\[6769\]: Invalid user byte from 113.125.25.73 Nov 5 19:50:32 srv3 sshd\[7017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.25.73 user=root Nov 5 19:50:35 srv3 sshd\[7017\]: Failed password for root from 113.125.25.73 port 42460 ssh2 Nov 5 19:55:15 srv3 sshd\[7102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.25.73 user=root Nov 5 20:10:18 srv3 sshd\[7395\]: Invalid user mailserver from 113.125.25.73 Nov 5 20:10:18 srv3 sshd\[7395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.25.73 Nov 5 20:10:20 srv3 sshd\[7395\]: Failed password for invalid user ... |
2019-11-06 17:39:07 |
50.250.231.41 | attack | Nov 6 04:30:29 debian sshd\[13472\]: Invalid user matsuo from 50.250.231.41 port 38829 Nov 6 04:30:29 debian sshd\[13472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.250.231.41 Nov 6 04:30:32 debian sshd\[13472\]: Failed password for invalid user matsuo from 50.250.231.41 port 38829 ssh2 ... |
2019-11-06 17:40:45 |
175.207.13.200 | attack | Nov 5 20:58:46 web9 sshd\[7397\]: Invalid user sds33322 from 175.207.13.200 Nov 5 20:58:46 web9 sshd\[7397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 Nov 5 20:58:48 web9 sshd\[7397\]: Failed password for invalid user sds33322 from 175.207.13.200 port 37420 ssh2 Nov 5 21:03:52 web9 sshd\[8068\]: Invalid user apaajaboleh from 175.207.13.200 Nov 5 21:03:52 web9 sshd\[8068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 |
2019-11-06 17:44:36 |
91.121.101.159 | attackspambots | ssh brute force |
2019-11-06 17:37:56 |
129.21.84.215 | attackspambots | Nov 6 09:35:00 lnxded63 sshd[22675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.21.84.215 Nov 6 09:35:00 lnxded63 sshd[22676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.21.84.215 Nov 6 09:35:02 lnxded63 sshd[22675]: Failed password for invalid user pi from 129.21.84.215 port 38590 ssh2 |
2019-11-06 17:32:48 |
223.220.159.78 | attack | Nov 6 05:15:10 firewall sshd[15779]: Invalid user ccom from 223.220.159.78 Nov 6 05:15:12 firewall sshd[15779]: Failed password for invalid user ccom from 223.220.159.78 port 62156 ssh2 Nov 6 05:20:42 firewall sshd[15907]: Invalid user passwd from 223.220.159.78 ... |
2019-11-06 17:48:44 |
112.175.127.189 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 17:35:51 |
140.115.126.21 | attackbotsspam | Nov 5 13:41:47 riskplan-s sshd[4928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.115.126.21 user=r.r Nov 5 13:41:48 riskplan-s sshd[4928]: Failed password for r.r from 140.115.126.21 port 60626 ssh2 Nov 5 13:41:49 riskplan-s sshd[4928]: Received disconnect from 140.115.126.21: 11: Bye Bye [preauth] Nov 5 13:58:23 riskplan-s sshd[5061]: Invalid user edu from 140.115.126.21 Nov 5 13:58:23 riskplan-s sshd[5061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.115.126.21 Nov 5 13:58:25 riskplan-s sshd[5061]: Failed password for invalid user edu from 140.115.126.21 port 46794 ssh2 Nov 5 13:58:25 riskplan-s sshd[5061]: Received disconnect from 140.115.126.21: 11: Bye Bye [preauth] Nov 5 14:02:38 riskplan-s sshd[5113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.115.126.21 user=r.r Nov 5 14:02:41 riskplan-s sshd[5113]: Failed ........ ------------------------------- |
2019-11-06 18:12:09 |
103.254.120.222 | attack | Nov 5 21:14:12 srv3 sshd\[8566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.120.222 user=root Nov 5 21:14:13 srv3 sshd\[8566\]: Failed password for root from 103.254.120.222 port 41034 ssh2 Nov 5 21:18:22 srv3 sshd\[8651\]: Invalid user admin from 103.254.120.222 Nov 5 21:18:22 srv3 sshd\[8651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.120.222 Nov 5 21:31:10 srv3 sshd\[8915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.120.222 user=root Nov 5 21:31:12 srv3 sshd\[8915\]: Failed password for root from 103.254.120.222 port 60540 ssh2 Nov 5 21:35:33 srv3 sshd\[9004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.120.222 user=root Nov 5 21:48:50 srv3 sshd\[9301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103. ... |
2019-11-06 17:46:31 |