City: unknown
Region: unknown
Country: Poland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.42.134.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.42.134.20. IN A
;; AUTHORITY SECTION:
. 595 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 16:11:02 CST 2022
;; MSG SIZE rcvd: 105
Host 20.134.42.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.134.42.94.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
139.99.62.10 | attackspam | Sep 16 00:16:00 localhost sshd\[2743\]: Invalid user marco from 139.99.62.10 port 40548 Sep 16 00:16:00 localhost sshd\[2743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.62.10 Sep 16 00:16:02 localhost sshd\[2743\]: Failed password for invalid user marco from 139.99.62.10 port 40548 ssh2 ... |
2019-09-16 08:47:25 |
129.158.73.144 | attack | Sep 16 01:51:10 OPSO sshd\[5876\]: Invalid user johny from 129.158.73.144 port 41214 Sep 16 01:51:10 OPSO sshd\[5876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.73.144 Sep 16 01:51:12 OPSO sshd\[5876\]: Failed password for invalid user johny from 129.158.73.144 port 41214 ssh2 Sep 16 01:55:42 OPSO sshd\[7494\]: Invalid user test from 129.158.73.144 port 63853 Sep 16 01:55:42 OPSO sshd\[7494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.73.144 |
2019-09-16 08:35:27 |
67.205.167.142 | attack | Invalid user balaji from 67.205.167.142 port 52740 |
2019-09-16 09:05:10 |
202.65.151.31 | attackbotsspam | Sep 15 14:42:07 sachi sshd\[20485\]: Invalid user qq from 202.65.151.31 Sep 15 14:42:07 sachi sshd\[20485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.151.31 Sep 15 14:42:08 sachi sshd\[20485\]: Failed password for invalid user qq from 202.65.151.31 port 48706 ssh2 Sep 15 14:46:28 sachi sshd\[20881\]: Invalid user testtest from 202.65.151.31 Sep 15 14:46:28 sachi sshd\[20881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.151.31 |
2019-09-16 08:56:47 |
45.141.151.96 | attack | Sep 16 08:49:43 our-server-hostname postfix/smtpd[2486]: connect from unknown[45.141.151.96] Sep 16 08:49:43 our-server-hostname postfix/smtpd[13899]: connect from unknown[45.141.151.96] Sep 16 08:49:52 our-server-hostname postfix/smtpd[15601]: connect from unknown[45.141.151.96] Sep 16 08:49:53 our-server-hostname sqlgrey: grey: new: 45.141.151.96(45.141.151.96), x@x -> x@x Sep 16 08:49:53 our-server-hostname sqlgrey: grey: new: 45.141.151.96(45.141.151.96), x@x -> x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep 16 08:49:53 our-server-hostname postfix/smtpd[13899]: disconnect from unknown[45.141.151.96] Sep 16 08:49:53 our-server-hostname sqlgrey: grey: new: 45.141.151.96(45.141.151.96), x@x -> x@x Sep x@x Sep x@x Sep x@x Sep 16 08:49:54 our-server-hostname sqlgrey: grey: new: 45.141.151.96(45.141.151.96), x@x -> x@x Sep x@x Sep x@x Sep x@x Sep 16 08:49:55 our-server-hostname postfix/smtpd[2486]: disconnect from unknown[45.141.151.96] Sep x@x Sep x@x Sep 16 08:........ ------------------------------- |
2019-09-16 08:37:23 |
154.124.209.185 | attackspambots | scan z |
2019-09-16 08:30:05 |
103.102.192.106 | attackbotsspam | 2019-09-15T23:44:08.870402abusebot-6.cloudsearch.cf sshd\[9884\]: Invalid user dorina from 103.102.192.106 port 24494 |
2019-09-16 08:39:57 |
222.91.248.106 | attackbotsspam | 'IP reached maximum auth failures for a one day block' |
2019-09-16 08:44:46 |
110.54.238.191 | attackspambots | Unauthorised access (Sep 16) SRC=110.54.238.191 LEN=52 TTL=114 ID=22915 DF TCP DPT=445 WINDOW=8192 SYN |
2019-09-16 08:39:27 |
159.203.201.66 | attackspambots | firewall-block, port(s): 5093/udp |
2019-09-16 09:01:39 |
104.248.242.125 | attackbotsspam | $f2bV_matches |
2019-09-16 08:44:12 |
132.145.170.174 | attackbotsspam | Sep 16 02:18:56 vpn01 sshd\[14235\]: Invalid user franz from 132.145.170.174 Sep 16 02:18:56 vpn01 sshd\[14235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174 Sep 16 02:18:58 vpn01 sshd\[14235\]: Failed password for invalid user franz from 132.145.170.174 port 16532 ssh2 |
2019-09-16 08:48:12 |
92.118.37.97 | attack | 3389BruteforceFW21 |
2019-09-16 08:46:03 |
49.88.112.113 | attack | Sep 16 02:21:34 rpi sshd[26018]: Failed password for root from 49.88.112.113 port 32386 ssh2 Sep 16 02:21:38 rpi sshd[26018]: Failed password for root from 49.88.112.113 port 32386 ssh2 |
2019-09-16 08:33:19 |
124.207.105.116 | attack | Sep 15 20:33:55 xtremcommunity sshd\[126258\]: Invalid user mashad from 124.207.105.116 port 39108 Sep 15 20:33:55 xtremcommunity sshd\[126258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.105.116 Sep 15 20:33:57 xtremcommunity sshd\[126258\]: Failed password for invalid user mashad from 124.207.105.116 port 39108 ssh2 Sep 15 20:37:54 xtremcommunity sshd\[126352\]: Invalid user uisfs from 124.207.105.116 port 45216 Sep 15 20:37:54 xtremcommunity sshd\[126352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.105.116 ... |
2019-09-16 08:45:28 |