City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.12.69.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;1.12.69.219. IN A
;; AUTHORITY SECTION:
. 436 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 23:34:01 CST 2022
;; MSG SIZE rcvd: 104
219.69.12.1.in-addr.arpa has no PTR record
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 219.69.12.1.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
158.255.238.129 | attackspambots | 20 attempts against mh-misbehave-ban on tree.magehost.pro |
2019-12-05 08:36:30 |
129.204.50.75 | attack | Dec 4 21:20:15 Ubuntu-1404-trusty-64-minimal sshd\[29644\]: Invalid user nabor from 129.204.50.75 Dec 4 21:20:15 Ubuntu-1404-trusty-64-minimal sshd\[29644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75 Dec 4 21:20:17 Ubuntu-1404-trusty-64-minimal sshd\[29644\]: Failed password for invalid user nabor from 129.204.50.75 port 42014 ssh2 Dec 4 21:28:12 Ubuntu-1404-trusty-64-minimal sshd\[3071\]: Invalid user webadmin from 129.204.50.75 Dec 4 21:28:12 Ubuntu-1404-trusty-64-minimal sshd\[3071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75 |
2019-12-05 08:44:10 |
45.229.154.100 | attack | Honeypot attack, port: 23, PTR: 45-229-154-100.grupocisvale.com.br. |
2019-12-05 08:51:48 |
41.93.32.88 | attackbotsspam | Dec 5 00:30:42 Ubuntu-1404-trusty-64-minimal sshd\[28025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88 user=root Dec 5 00:30:45 Ubuntu-1404-trusty-64-minimal sshd\[28025\]: Failed password for root from 41.93.32.88 port 36032 ssh2 Dec 5 00:38:40 Ubuntu-1404-trusty-64-minimal sshd\[31645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88 user=root Dec 5 00:38:42 Ubuntu-1404-trusty-64-minimal sshd\[31645\]: Failed password for root from 41.93.32.88 port 51996 ssh2 Dec 5 00:46:14 Ubuntu-1404-trusty-64-minimal sshd\[8016\]: Invalid user atmosphere from 41.93.32.88 Dec 5 00:46:14 Ubuntu-1404-trusty-64-minimal sshd\[8016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88 |
2019-12-05 08:52:16 |
185.74.4.189 | attackspambots | $f2bV_matches |
2019-12-05 08:27:12 |
42.159.93.208 | attackbots | Lines containing failures of 42.159.93.208 Dec 4 20:07:31 shared02 sshd[21047]: Invalid user bettcher from 42.159.93.208 port 60236 Dec 4 20:07:31 shared02 sshd[21047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.93.208 Dec 4 20:07:33 shared02 sshd[21047]: Failed password for invalid user bettcher from 42.159.93.208 port 60236 ssh2 Dec 4 20:07:33 shared02 sshd[21047]: Received disconnect from 42.159.93.208 port 60236:11: Bye Bye [preauth] Dec 4 20:07:33 shared02 sshd[21047]: Disconnected from invalid user bettcher 42.159.93.208 port 60236 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=42.159.93.208 |
2019-12-05 08:43:50 |
49.234.18.158 | attack | Dec 5 00:40:45 fr01 sshd[32129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 user=root Dec 5 00:40:47 fr01 sshd[32129]: Failed password for root from 49.234.18.158 port 38556 ssh2 Dec 5 00:51:03 fr01 sshd[1552]: Invalid user frederique from 49.234.18.158 Dec 5 00:51:03 fr01 sshd[1552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Dec 5 00:51:03 fr01 sshd[1552]: Invalid user frederique from 49.234.18.158 Dec 5 00:51:05 fr01 sshd[1552]: Failed password for invalid user frederique from 49.234.18.158 port 57852 ssh2 ... |
2019-12-05 08:18:56 |
125.132.5.131 | attackbotsspam | Dec 4 14:01:38 web9 sshd\[12598\]: Invalid user 123456 from 125.132.5.131 Dec 4 14:01:38 web9 sshd\[12598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.132.5.131 Dec 4 14:01:39 web9 sshd\[12598\]: Failed password for invalid user 123456 from 125.132.5.131 port 35420 ssh2 Dec 4 14:08:29 web9 sshd\[13653\]: Invalid user makeda from 125.132.5.131 Dec 4 14:08:29 web9 sshd\[13653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.132.5.131 |
2019-12-05 08:18:35 |
112.64.32.118 | attack | Dec 4 14:03:50 web9 sshd\[12950\]: Invalid user valadez from 112.64.32.118 Dec 4 14:03:50 web9 sshd\[12950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118 Dec 4 14:03:52 web9 sshd\[12950\]: Failed password for invalid user valadez from 112.64.32.118 port 44586 ssh2 Dec 4 14:11:36 web9 sshd\[14217\]: Invalid user test from 112.64.32.118 Dec 4 14:11:36 web9 sshd\[14217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118 |
2019-12-05 08:23:03 |
61.172.128.207 | attack | Honeypot attack, port: 445, PTR: mail.yfkey.com. |
2019-12-05 08:50:49 |
93.152.159.11 | attackspambots | Dec 4 12:12:45 kapalua sshd\[30205\]: Invalid user kenyang from 93.152.159.11 Dec 4 12:12:45 kapalua sshd\[30205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.152.159.11 Dec 4 12:12:48 kapalua sshd\[30205\]: Failed password for invalid user kenyang from 93.152.159.11 port 49820 ssh2 Dec 4 12:18:34 kapalua sshd\[30817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.152.159.11 user=root Dec 4 12:18:36 kapalua sshd\[30817\]: Failed password for root from 93.152.159.11 port 60476 ssh2 |
2019-12-05 08:33:19 |
188.136.206.76 | attack | " " |
2019-12-05 08:24:35 |
64.28.110.140 | attackspambots | F2B jail: sshd. Time: 2019-12-04 21:13:00, Reported by: VKReport |
2019-12-05 08:26:23 |
89.44.183.105 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-12-05 08:35:35 |
110.231.4.21 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-12-05 08:42:21 |