City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.107.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.18.107.66. IN A
;; AUTHORITY SECTION:
. 525 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 11 18:31:47 CST 2022
;; MSG SIZE rcvd: 106
Host 66.107.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.107.18.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
196.206.142.93 | attackspambots | Feb 9 17:29:08 debian sshd[13067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.206.142.93 user=daemon Feb 9 17:29:10 debian sshd[13067]: Failed password for daemon from 196.206.142.93 port 64027 ssh2 Feb 9 17:29:14 debian sshd[13069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.206.142.93 user=daemon Feb 9 17:29:15 debian sshd[13069]: Failed password for daemon from 196.206.142.93 port 64840 ssh2 Feb 9 17:29:17 debian sshd[13071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.206.142.93 user=daemon ... |
2020-02-10 06:47:19 |
49.50.66.209 | attackspambots | 02/09/2020-23:08:37.555179 49.50.66.209 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 69 |
2020-02-10 07:02:37 |
80.211.86.25 | attackbots | MALWARE-CNC User-Agent known malicious user-agent string ZmEu - vulnerability scanner |
2020-02-10 06:57:29 |
119.29.129.88 | attackspam | $f2bV_matches |
2020-02-10 07:19:02 |
199.249.230.116 | attack | xmlrpc attack |
2020-02-10 06:55:24 |
222.186.175.154 | attackspambots | $f2bV_matches |
2020-02-10 06:50:41 |
188.226.167.212 | attack | SASL PLAIN auth failed: ruser=... |
2020-02-10 07:11:42 |
187.72.119.177 | attackspam | Honeypot attack, port: 445, PTR: correio.hsadv.com.br. |
2020-02-10 07:07:07 |
115.135.108.228 | attack | Feb 9 22:08:27 thevastnessof sshd[27732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.135.108.228 ... |
2020-02-10 07:13:25 |
115.74.225.130 | attack | Honeypot attack, port: 445, PTR: adsl.viettel.vn. |
2020-02-10 06:59:36 |
122.225.85.78 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-10 07:15:12 |
154.204.42.22 | attack | Feb 9 19:05:28 firewall sshd[7463]: Invalid user rga from 154.204.42.22 Feb 9 19:05:30 firewall sshd[7463]: Failed password for invalid user rga from 154.204.42.22 port 42438 ssh2 Feb 9 19:08:31 firewall sshd[7611]: Invalid user nxe from 154.204.42.22 ... |
2020-02-10 07:09:39 |
165.227.179.138 | attackbotsspam | no |
2020-02-10 07:23:55 |
78.186.49.146 | attackspam | Honeypot attack, port: 81, PTR: 78.186.49.146.static.ttnet.com.tr. |
2020-02-10 07:23:38 |
180.174.34.29 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-10 06:58:12 |