The webmaster of ufn.edu.br joined AbuseIPDB in August 2019 and has reported 1,108,293 IP addresses.
Standing (weight) is good.
ACTIVE USER
WEBMASTER
SUPPORTER
- « Previous
- Next »
IP | Date | Comment | Categories |
---|---|---|---|
218.92.0.113 | Brute-Force SSH | ||
13.235.78.172 |
Sep 8 13:04:35 wslbvm01 sshd[2874156]: Failed password for root from 13.235.78.172 port 49478 ssh2< ... show moreSep 8 13:04:35 wslbvm01 sshd[2874156]: Failed password for root from 13.235.78.172 port 49478 ssh2
Sep 8 13:05:05 wslbvm01 sshd[2874307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.235.78.172 user=root Sep 8 13:05:07 wslbvm01 sshd[2874307]: Failed password for root from 13.235.78.172 port 49438 ssh2 ... show less |
Brute-Force SSH | |
81.70.208.164 |
Sep 8 12:45:10 lasmivm01 sshd[1871307]: Invalid user compiler from 81.70.208.164 port 47442
S ... show moreSep 8 12:45:10 lasmivm01 sshd[1871307]: Invalid user compiler from 81.70.208.164 port 47442
Sep 8 12:45:10 lasmivm01 sshd[1871307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.208.164 Sep 8 12:45:12 lasmivm01 sshd[1871307]: Failed password for invalid user compiler from 81.70.208.164 port 47442 ssh2 ... show less |
Brute-Force SSH | |
121.229.14.1 |
Sep 8 12:39:48 lasmivm01 sshd[1869803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 12:39:48 lasmivm01 sshd[1869803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.14.1
Sep 8 12:39:50 lasmivm01 sshd[1869803]: Failed password for invalid user nuevo from 121.229.14.1 port 59562 ssh2 Sep 8 12:43:24 lasmivm01 sshd[1870833]: Invalid user sahar from 121.229.14.1 port 56998 ... show less |
Brute-Force SSH | |
185.216.133.182 |
Sep 8 12:34:40 lasmivm01 sshd[1868501]: Failed password for invalid user nuevo from 185.216.133.182 ... show moreSep 8 12:34:40 lasmivm01 sshd[1868501]: Failed password for invalid user nuevo from 185.216.133.182 port 48258 ssh2
Sep 8 12:41:43 lasmivm01 sshd[1870391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.133.182 user=root Sep 8 12:41:46 lasmivm01 sshd[1870391]: Failed password for root from 185.216.133.182 port 60808 ssh2 ... show less |
Brute-Force SSH | |
157.245.196.246 |
Sep 8 12:39:14 lasmivm01 sshd[1869670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 12:39:14 lasmivm01 sshd[1869670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.196.246
Sep 8 12:39:17 lasmivm01 sshd[1869670]: Failed password for invalid user usuario from 157.245.196.246 port 55208 ssh2 Sep 8 12:41:27 lasmivm01 sshd[1870289]: Invalid user koha from 157.245.196.246 port 41774 ... show less |
Brute-Force SSH | |
40.117.97.0 |
Sep 8 12:40:23 lasmivm01 sshd[1869995]: Invalid user ram from 40.117.97.0 port 38294
Sep 8 1 ... show moreSep 8 12:40:23 lasmivm01 sshd[1869995]: Invalid user ram from 40.117.97.0 port 38294
Sep 8 12:40:23 lasmivm01 sshd[1869995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.97.0 Sep 8 12:40:25 lasmivm01 sshd[1869995]: Failed password for invalid user ram from 40.117.97.0 port 38294 ssh2 ... show less |
Brute-Force SSH | |
195.26.47.38 |
Sep 8 12:38:20 lasmivm01 sshd[1869404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 12:38:20 lasmivm01 sshd[1869404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.26.47.38
Sep 8 12:38:23 lasmivm01 sshd[1869404]: Failed password for invalid user esearch from 195.26.47.38 port 35214 ssh2 Sep 8 12:40:19 lasmivm01 sshd[1869938]: Invalid user ubuntu from 195.26.47.38 port 53020 ... show less |
Brute-Force SSH | |
121.160.189.9 |
Sep 8 12:38:02 ws12vmsma01 sshd[25985]: Failed password for root from 121.160.189.9 port 56464 ssh2 ... show moreSep 8 12:38:02 ws12vmsma01 sshd[25985]: Failed password for root from 121.160.189.9 port 56464 ssh2
Sep 8 12:38:13 ws12vmsma01 sshd[25985]: error: maximum authentication attempts exceeded for root from 121.160.189.9 port 56464 ssh2 [preauth] Sep 8 12:38:13 ws12vmsma01 sshd[25985]: Disconnecting: Too many authentication failures for root [preauth] ... show less |
Brute-Force SSH | |
5.196.114.220 |
Sep 8 12:30:35 wslbvm01 sshd[2865501]: Invalid user pos from 5.196.114.220 port 44666
Sep 8 ... show moreSep 8 12:30:35 wslbvm01 sshd[2865501]: Invalid user pos from 5.196.114.220 port 44666
Sep 8 12:30:37 wslbvm01 sshd[2865501]: Failed password for invalid user pos from 5.196.114.220 port 44666 ssh2 Sep 8 12:33:33 wslbvm01 sshd[2866263]: Invalid user sandy from 5.196.114.220 port 58153 ... show less |
Brute-Force SSH | |
222.102.21.102 |
Sep 8 11:52:22 wslbvm01 sshd[2855567]: Failed password for root from 222.102.21.102 port 49256 ssh2 ... show moreSep 8 11:52:22 wslbvm01 sshd[2855567]: Failed password for root from 222.102.21.102 port 49256 ssh2
Sep 8 11:52:23 wslbvm01 sshd[2855567]: Failed password for root from 222.102.21.102 port 49256 ssh2 Sep 8 11:52:26 wslbvm01 sshd[2855567]: Failed password for root from 222.102.21.102 port 49256 ssh2 ... show less |
Brute-Force SSH | |
179.43.133.242 |
[Sun Sep 08 11:48:06.187037 2024] [access_compat:error] [pid 1639] [client 179.43.133.242:55712] AH0 ... show more[Sun Sep 08 11:48:06.187037 2024] [access_compat:error] [pid 1639] [client 179.43.133.242:55712] AH01797: client denied by server configuration: /var/www/html/linusadmin-phpinfo.php
[Sun Sep 08 11:48:06.410385 2024] [access_compat:error] [pid 1639] [client 179.43.133.242:55712] AH01797: client denied by server configuration: /var/www/html/info.php [Sun Sep 08 11:48:06.633819 2024] [access_compat:error] [pid 1639] [client 179.43.133.242:55712] AH01797: client denied by server configuration: /var/www/html/phpinfo.php ... show less |
Exploited Host Web App Attack | |
167.172.77.46 |
[Sun Sep 08 10:57:55.591088 2024] [access_compat:error] [pid 31519] [client 167.172.77.46:38092] AH0 ... show more[Sun Sep 08 10:57:55.591088 2024] [access_compat:error] [pid 31519] [client 167.172.77.46:38092] AH01797: client denied by server configuration: /var/www/html/upl.php
[Sun Sep 08 10:57:58.646308 2024] [access_compat:error] [pid 31232] [client 167.172.77.46:38120] AH01797: client denied by server configuration: /var/www/html/1.php [Sun Sep 08 10:58:00.309653 2024] [access_compat:error] [pid 31519] [client 167.172.77.46:38132] AH01797: client denied by server configuration: /var/www/html/password.php ... show less |
Exploited Host Web App Attack | |
45.154.2.74 |
Sep 8 10:24:10 ws22vmsma01 sshd[32140]: Failed password for root from 45.154.2.74 port 37664 ssh2<b ... show moreSep 8 10:24:10 ws22vmsma01 sshd[32140]: Failed password for root from 45.154.2.74 port 37664 ssh2
Sep 8 10:36:13 ws22vmsma01 sshd[2803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.2.74 ... show less |
Brute-Force SSH | |
105.112.236.16 |
[Sun Sep 08 10:30:05.200463 2024] [:error] [pid 1639] [client 105.112.236.16:30702] script '/va ... show more[Sun Sep 08 10:30:05.200463 2024] [:error] [pid 1639] [client 105.112.236.16:30702] script '/var/www/www.periodicos.ufn.edu.br/files/usageStats/stage/alexus.php' not found or unable to stat, referer: http://periodicos.unifra.br:443/www.periodicos.ufn.edu.br/files/usageStats/stage/alexus.php
[Sun Sep 08 10:31:01.583906 2024] [:error] [pid 31232] [client 105.112.236.16:31578] script '/var/www/www.periodicos.ufn.edu.br/files/usageStats/stage/alexus.php' not found or unable to stat, referer: http://periodicos.unifra.br:443/www.periodicos.ufn.edu.br/files/usageStats/stage/alexus.php [Sun Sep 08 10:32:01.580183 2024] [:error] [pid 31233] [client 105.112.236.16:1214] script '/var/www/www.periodicos.ufn.edu.br/files/usageStats/stage/alexus.php' not found or unable to stat, referer: http://periodicos.unifra.br:443/www.periodicos.ufn.edu.br/files/usageStats/stage/alexus.php ... show less |
Exploited Host Web App Attack | |
159.223.190.23 |
Sep 8 10:28:52 ws22vmsma01 sshd[886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreSep 8 10:28:52 ws22vmsma01 sshd[886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.190.23
Sep 8 10:28:53 ws22vmsma01 sshd[886]: Failed password for invalid user a3user from 159.223.190.23 port 34896 ssh2 ... show less |
Brute-Force SSH | |
140.246.11.47 |
Sep 8 10:18:15 ws12vmsma01 sshd[22319]: Failed password for root from 140.246.11.47 port 47064 ssh2 ... show moreSep 8 10:18:15 ws12vmsma01 sshd[22319]: Failed password for root from 140.246.11.47 port 47064 ssh2
Sep 8 10:18:41 ws12vmsma01 sshd[22491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.11.47 user=root Sep 8 10:18:43 ws12vmsma01 sshd[22491]: Failed password for root from 140.246.11.47 port 47324 ssh2 ... show less |
Brute-Force SSH | |
118.36.15.126 |
Sep 8 10:13:44 ws22vmsma01 sshd[29592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 10:13:44 ws22vmsma01 sshd[29592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.36.15.126
Sep 8 10:13:46 ws22vmsma01 sshd[29592]: Failed password for invalid user hikvision from 118.36.15.126 port 63326 ssh2 ... show less |
Brute-Force SSH | |
139.99.161.252 |
Sep 8 10:12:14 ws22vmsma01 sshd[29201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 10:12:14 ws22vmsma01 sshd[29201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.161.252
Sep 8 10:12:15 ws22vmsma01 sshd[29201]: Failed password for invalid user vlad from 139.99.161.252 port 46778 ssh2 ... show less |
Brute-Force SSH | |
51.38.70.168 |
Sep 8 10:06:51 ws22vmsma01 sshd[27556]: Failed password for root from 51.38.70.168 port 34126 ssh2< ... show moreSep 8 10:06:51 ws22vmsma01 sshd[27556]: Failed password for root from 51.38.70.168 port 34126 ssh2
Sep 8 10:10:57 ws22vmsma01 sshd[28873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.70.168 ... show less |
Brute-Force SSH | |
198.12.114.232 | Brute-Force SSH | ||
143.198.9.189 | Brute-Force SSH | ||
193.227.182.203 |
Sep 8 10:02:38 ws22vmsma01 sshd[26507]: Failed password for root from 193.227.182.203 port 48796 ss ... show moreSep 8 10:02:38 ws22vmsma01 sshd[26507]: Failed password for root from 193.227.182.203 port 48796 ssh2
Sep 8 10:10:15 ws22vmsma01 sshd[28612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.227.182.203 ... show less |
Brute-Force SSH | |
139.155.30.57 |
Sep 8 10:09:48 ws22vmsma01 sshd[28473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 10:09:48 ws22vmsma01 sshd[28473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.30.57
Sep 8 10:09:50 ws22vmsma01 sshd[28473]: Failed password for invalid user mqm from 139.155.30.57 port 33028 ssh2 ... show less |
Brute-Force SSH | |
223.197.186.7 |
Sep 8 10:09:39 ws22vmsma01 sshd[28409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreSep 8 10:09:39 ws22vmsma01 sshd[28409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.186.7
Sep 8 10:09:41 ws22vmsma01 sshd[28409]: Failed password for invalid user slam from 223.197.186.7 port 58020 ssh2 ... show less |
Brute-Force SSH |
- « Previous
- Next »