City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.99.19.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;0.99.19.74. IN A
;; AUTHORITY SECTION:
. 410 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023120702 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 08 10:56:14 CST 2023
;; MSG SIZE rcvd: 103
Host 74.19.99.0.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.19.99.0.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 165.227.2.193 | attack | 1601412067 - 09/29/2020 22:41:07 Host: 165.227.2.193/165.227.2.193 Port: 113 TCP Blocked |
2020-10-01 04:09:15 |
| 103.79.169.23 | attackbotsspam | Port scan on 1 port(s): 445 |
2020-10-01 04:08:06 |
| 178.128.22.249 | attack | Time: Wed Sep 30 13:55:46 2020 +0000 IP: 178.128.22.249 (SG/Singapore/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 30 13:30:53 1 sshd[10829]: Invalid user seb from 178.128.22.249 port 53119 Sep 30 13:30:55 1 sshd[10829]: Failed password for invalid user seb from 178.128.22.249 port 53119 ssh2 Sep 30 13:46:38 1 sshd[11329]: Invalid user magic from 178.128.22.249 port 49481 Sep 30 13:46:40 1 sshd[11329]: Failed password for invalid user magic from 178.128.22.249 port 49481 ssh2 Sep 30 13:55:41 1 sshd[11587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.22.249 user=root |
2020-10-01 04:25:11 |
| 49.234.212.177 | attackbots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-01 04:28:40 |
| 182.61.29.203 | attackbots | Oct 1 02:15:02 itv-usvr-01 sshd[12668]: Invalid user netflow from 182.61.29.203 Oct 1 02:15:02 itv-usvr-01 sshd[12668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.29.203 Oct 1 02:15:02 itv-usvr-01 sshd[12668]: Invalid user netflow from 182.61.29.203 Oct 1 02:15:04 itv-usvr-01 sshd[12668]: Failed password for invalid user netflow from 182.61.29.203 port 47360 ssh2 |
2020-10-01 04:13:20 |
| 36.155.113.40 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-30T10:36:25Z and 2020-09-30T10:49:34Z |
2020-10-01 04:09:34 |
| 222.124.17.227 | attackbots | Sep 30 21:30:18 host2 sshd[310780]: Invalid user safeuser from 222.124.17.227 port 53840 Sep 30 21:30:19 host2 sshd[310780]: Failed password for invalid user safeuser from 222.124.17.227 port 53840 ssh2 Sep 30 21:30:18 host2 sshd[310780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.17.227 Sep 30 21:30:18 host2 sshd[310780]: Invalid user safeuser from 222.124.17.227 port 53840 Sep 30 21:30:19 host2 sshd[310780]: Failed password for invalid user safeuser from 222.124.17.227 port 53840 ssh2 ... |
2020-10-01 04:30:33 |
| 103.145.13.180 | attack | Brute force attempt on PBX |
2020-10-01 04:10:15 |
| 82.166.75.56 | attackspambots | Automatic report - Port Scan Attack |
2020-10-01 04:15:43 |
| 159.65.154.48 | attackbotsspam | 28873/tcp 26360/tcp 12490/tcp... [2020-07-31/09-30]209pkt,71pt.(tcp) |
2020-10-01 04:20:34 |
| 118.126.98.159 | attackbotsspam | Sep 30 22:47:32 gw1 sshd[7571]: Failed password for root from 118.126.98.159 port 36200 ssh2 ... |
2020-10-01 04:06:04 |
| 14.21.29.26 | attackbots | Port probing on unauthorized port 445 |
2020-10-01 04:00:34 |
| 23.102.159.50 | attackbots | [2020-09-30 04:31:45] NOTICE[1159][C-00003d3a] chan_sip.c: Call from '' (23.102.159.50:54019) to extension '512342180803' rejected because extension not found in context 'public'. [2020-09-30 04:31:45] SECURITY[1198] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-30T04:31:45.781-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="512342180803",SessionID="0x7fcaa03c7fb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/23.102.159.50/54019",ACLName="no_extension_match" [2020-09-30 04:34:31] NOTICE[1159][C-00003d3d] chan_sip.c: Call from '' (23.102.159.50:62670) to extension '412342180803' rejected because extension not found in context 'public'. [2020-09-30 04:34:31] SECURITY[1198] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-30T04:34:31.836-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="412342180803",SessionID="0x7fcaa03c7fb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/23.102.159.5 ... |
2020-10-01 04:15:02 |
| 106.53.232.38 | attackbots | Invalid user hadoop from 106.53.232.38 port 51576 |
2020-10-01 04:32:15 |
| 150.158.181.16 | attackbotsspam | Bruteforce detected by fail2ban |
2020-10-01 04:02:15 |