City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.109.145.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.109.145.221. IN A
;; AUTHORITY SECTION:
. 245 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 06:50:42 CST 2022
;; MSG SIZE rcvd: 108
221.145.109.104.in-addr.arpa domain name pointer a104-109-145-221.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
221.145.109.104.in-addr.arpa name = a104-109-145-221.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
120.131.3.144 | attack | Lines containing failures of 120.131.3.144 Dec 30 23:58:46 home sshd[12751]: Invalid user anonftpr.r from 120.131.3.144 port 44847 Dec 30 23:58:46 home sshd[12751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.144 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=120.131.3.144 |
2020-01-01 09:02:38 |
61.81.131.75 | attackspam | firewall-block, port(s): 4567/tcp |
2020-01-01 08:58:35 |
91.209.54.54 | attack | $f2bV_matches_ltvn |
2020-01-01 08:40:18 |
118.27.31.188 | attackspambots | Jan 1 00:44:32 sd-53420 sshd\[21213\]: User root from 118.27.31.188 not allowed because none of user's groups are listed in AllowGroups Jan 1 00:44:32 sd-53420 sshd\[21213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.31.188 user=root Jan 1 00:44:34 sd-53420 sshd\[21213\]: Failed password for invalid user root from 118.27.31.188 port 52626 ssh2 Jan 1 00:47:24 sd-53420 sshd\[22091\]: Invalid user karlerik from 118.27.31.188 Jan 1 00:47:24 sd-53420 sshd\[22091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.31.188 ... |
2020-01-01 08:32:02 |
222.188.109.227 | attackbots | Jan 1 00:28:59 MK-Soft-Root1 sshd[14542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.109.227 Jan 1 00:29:01 MK-Soft-Root1 sshd[14542]: Failed password for invalid user test from 222.188.109.227 port 34954 ssh2 ... |
2020-01-01 08:28:00 |
103.28.121.58 | attackbots | Unauthorized access detected from banned ip |
2020-01-01 08:41:38 |
106.12.81.233 | attackspambots | Dec 31 13:13:04 web9 sshd\[19818\]: Invalid user password1235 from 106.12.81.233 Dec 31 13:13:04 web9 sshd\[19818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.81.233 Dec 31 13:13:06 web9 sshd\[19818\]: Failed password for invalid user password1235 from 106.12.81.233 port 42856 ssh2 Dec 31 13:14:27 web9 sshd\[19988\]: Invalid user piene from 106.12.81.233 Dec 31 13:14:27 web9 sshd\[19988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.81.233 |
2020-01-01 08:34:58 |
79.97.188.172 | attackbotsspam | /var/log/messages:Dec 31 14:38:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1577803107.820:108047): pid=4145 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4146 suid=74 rport=40098 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=79.97.188.172 terminal=? res=success' /var/log/messages:Dec 31 14:38:27 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1577803107.824:108048): pid=4145 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4146 suid=74 rport=40098 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=79.97.188.172 terminal=? res=success' /var/log/messages:Dec 31 14:38:28 sanyalnet-cloud-vps fail2ban.filter[1551]: INFO [sshd]........ ------------------------------- |
2020-01-01 08:52:47 |
121.241.244.92 | attackspambots | Jan 1 00:39:03 markkoudstaal sshd[5276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92 Jan 1 00:39:05 markkoudstaal sshd[5276]: Failed password for invalid user dbus from 121.241.244.92 port 55491 ssh2 Jan 1 00:40:40 markkoudstaal sshd[5405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92 |
2020-01-01 08:31:01 |
46.101.254.248 | attackbots | Jan 1 00:31:07 lnxmysql61 sshd[13979]: Failed password for root from 46.101.254.248 port 55408 ssh2 Jan 1 00:31:07 lnxmysql61 sshd[13979]: Failed password for root from 46.101.254.248 port 55408 ssh2 |
2020-01-01 08:29:28 |
51.75.52.127 | attack | Unauthorized connection attempt detected from IP address 51.75.52.127 to port 9210 |
2020-01-01 08:27:22 |
69.67.32.66 | attack | SQL APT Attack Reported by and Credit to nic@wlink.biz /0909.54.54.99 from IP 118.69.71.82 Cha mẹ tui bây không dạy tụi bây cách hành xử cho sao cho tử tế à ? Làm người tử tế không chịu, lại thích đi làm ăn trộm, ăn cướp, lưu manh ! |
2020-01-01 08:33:42 |
45.136.108.120 | attack | Jan 1 01:23:54 debian-2gb-nbg1-2 kernel: \[97568.094870\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.120 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=61892 PROTO=TCP SPT=48131 DPT=1998 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-01 08:27:35 |
114.67.90.149 | attackbotsspam | Dec 31 19:30:32 plusreed sshd[5654]: Invalid user login15 from 114.67.90.149 ... |
2020-01-01 08:41:11 |
49.233.93.28 | attack | Lines containing failures of 49.233.93.28 Dec 31 23:14:54 siirappi sshd[32555]: Invalid user barbie from 49.233.93.28 port 47846 Dec 31 23:14:54 siirappi sshd[32555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.93.28 Dec 31 23:14:56 siirappi sshd[32555]: Failed password for invalid user barbie from 49.233.93.28 port 47846 ssh2 Dec 31 23:14:56 siirappi sshd[32555]: Received disconnect from 49.233.93.28 port 47846:11: Bye Bye [preauth] Dec 31 23:14:56 siirappi sshd[32555]: Disconnected from 49.233.93.28 port 47846 [preauth] Dec 31 23:41:46 siirappi sshd[596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.93.28 user=backup Dec 31 23:41:48 siirappi sshd[596]: Failed password for backup from 49.233.93.28 port 42588 ssh2 Dec 31 23:41:48 siirappi sshd[596]: Received disconnect from 49.233.93.28 port 42588:11: Bye Bye [preauth] Dec 31 23:41:48 siirappi sshd[596]: Disconnected fro........ ------------------------------ |
2020-01-01 08:28:57 |