City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.142.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.149.142.142. IN A
;; AUTHORITY SECTION:
. 577 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030100 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 15:43:26 CST 2022
;; MSG SIZE rcvd: 108
Host 142.142.149.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.142.149.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
162.14.18.167 | attackspambots | ICMP MH Probe, Scan /Distributed - |
2020-05-26 15:45:38 |
162.14.18.106 | attack | ICMP MH Probe, Scan /Distributed - |
2020-05-26 15:54:47 |
117.254.186.98 | attackbotsspam | May 26 01:21:56 ajax sshd[2112]: Failed password for root from 117.254.186.98 port 49656 ssh2 |
2020-05-26 15:24:19 |
200.81.120.128 | attack | Unauthorized connection attempt detected from IP address 200.81.120.128 to port 8000 |
2020-05-26 15:19:15 |
106.54.45.175 | attackspambots | May 26 01:25:52 Tower sshd[38571]: Connection from 106.54.45.175 port 49364 on 192.168.10.220 port 22 rdomain "" May 26 01:25:54 Tower sshd[38571]: Invalid user cloud-user from 106.54.45.175 port 49364 May 26 01:25:54 Tower sshd[38571]: error: Could not get shadow information for NOUSER May 26 01:25:54 Tower sshd[38571]: Failed password for invalid user cloud-user from 106.54.45.175 port 49364 ssh2 May 26 01:25:55 Tower sshd[38571]: Received disconnect from 106.54.45.175 port 49364:11: Bye Bye [preauth] May 26 01:25:55 Tower sshd[38571]: Disconnected from invalid user cloud-user 106.54.45.175 port 49364 [preauth] |
2020-05-26 15:31:50 |
162.14.18.180 | attackspambots | ICMP MH Probe, Scan /Distributed - |
2020-05-26 15:41:53 |
45.77.64.119 | attackspambots | Automatic report - Banned IP Access |
2020-05-26 15:56:52 |
103.233.49.15 | attackbotsspam | $f2bV_matches |
2020-05-26 15:55:55 |
59.127.214.245 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-26 15:34:42 |
175.24.139.99 | attackspam | May 25 19:12:44 eddieflores sshd\[9191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.139.99 user=root May 25 19:12:46 eddieflores sshd\[9191\]: Failed password for root from 175.24.139.99 port 41584 ssh2 May 25 19:16:29 eddieflores sshd\[9494\]: Invalid user map from 175.24.139.99 May 25 19:16:29 eddieflores sshd\[9494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.139.99 May 25 19:16:31 eddieflores sshd\[9494\]: Failed password for invalid user map from 175.24.139.99 port 52894 ssh2 |
2020-05-26 15:20:02 |
168.232.198.218 | attack | 2020-05-26T09:37:08.924975mail.broermann.family sshd[2364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-198-218.static.konectivatelecomunicacoes.com.br 2020-05-26T09:37:08.919649mail.broermann.family sshd[2364]: Invalid user developer from 168.232.198.218 port 35530 2020-05-26T09:37:11.557185mail.broermann.family sshd[2364]: Failed password for invalid user developer from 168.232.198.218 port 35530 ssh2 2020-05-26T09:41:28.751341mail.broermann.family sshd[2559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-198-218.static.konectivatelecomunicacoes.com.br user=root 2020-05-26T09:41:31.409032mail.broermann.family sshd[2559]: Failed password for root from 168.232.198.218 port 39744 ssh2 ... |
2020-05-26 16:02:44 |
37.187.7.95 | attackspambots | 2020-05-26T09:27:33.403507vps751288.ovh.net sshd\[16225\]: Invalid user teamspeak3 from 37.187.7.95 port 44080 2020-05-26T09:27:33.416893vps751288.ovh.net sshd\[16225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks3372588.kimsufi.com 2020-05-26T09:27:35.933229vps751288.ovh.net sshd\[16225\]: Failed password for invalid user teamspeak3 from 37.187.7.95 port 44080 ssh2 2020-05-26T09:33:28.517491vps751288.ovh.net sshd\[16261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks3372588.kimsufi.com user=root 2020-05-26T09:33:30.435706vps751288.ovh.net sshd\[16261\]: Failed password for root from 37.187.7.95 port 46671 ssh2 |
2020-05-26 15:41:14 |
148.71.44.11 | attackbotsspam | Lines containing failures of 148.71.44.11 May 25 06:34:35 install sshd[1552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.44.11 user=r.r May 25 06:34:37 install sshd[1552]: Failed password for r.r from 148.71.44.11 port 35155 ssh2 May 25 06:34:37 install sshd[1552]: Received disconnect from 148.71.44.11 port 35155:11: Bye Bye [preauth] May 25 06:34:37 install sshd[1552]: Disconnected from authenticating user r.r 148.71.44.11 port 35155 [preauth] May 25 06:38:19 install sshd[2737]: Invalid user morag from 148.71.44.11 port 33044 May 25 06:38:19 install sshd[2737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.44.11 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=148.71.44.11 |
2020-05-26 15:23:58 |
51.15.80.14 | attackspam | (mod_security) mod_security (id:210492) triggered by 51.15.80.14 (NL/Netherlands/14-80-15-51.rev.cloud.scaleway.com): 5 in the last 3600 secs |
2020-05-26 15:25:48 |
189.112.48.51 | attackspambots | 200526 3:15:07 [Warning] Access denied for user 'root'@'189.112.48.51' (using password: YES) 200526 3:15:07 [Warning] Access denied for user 'root'@'189.112.48.51' (using password: YES) 200526 3:15:07 [Warning] Access denied for user 'root'@'189.112.48.51' (using password: YES) ... |
2020-05-26 15:43:32 |