City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.116.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.20.116.104. IN A
;; AUTHORITY SECTION:
. 347 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022041102 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 12 09:27:35 CST 2022
;; MSG SIZE rcvd: 107
Host 104.116.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.116.20.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
125.27.44.147 | attackbots | Unauthorized connection attempt from IP address 125.27.44.147 on Port 445(SMB) |
2020-04-07 19:59:29 |
36.67.128.250 | attackbots | Unauthorized connection attempt from IP address 36.67.128.250 on Port 445(SMB) |
2020-04-07 20:06:00 |
123.207.235.247 | attackspam | $f2bV_matches |
2020-04-07 19:46:47 |
122.228.19.79 | attackbots | Unauthorized connection attempt detected from IP address 122.228.19.79 to port 70 [T] |
2020-04-07 20:11:10 |
185.204.3.36 | attackbotsspam | Apr 7 11:40:21 ks10 sshd[3023167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.204.3.36 Apr 7 11:40:23 ks10 sshd[3023167]: Failed password for invalid user jeff from 185.204.3.36 port 51080 ssh2 ... |
2020-04-07 19:57:05 |
43.242.74.39 | attackspam | Apr 7 04:25:52 Tower sshd[18104]: Connection from 43.242.74.39 port 42144 on 192.168.10.220 port 22 rdomain "" Apr 7 04:25:56 Tower sshd[18104]: Invalid user testftp from 43.242.74.39 port 42144 Apr 7 04:25:56 Tower sshd[18104]: error: Could not get shadow information for NOUSER Apr 7 04:25:56 Tower sshd[18104]: Failed password for invalid user testftp from 43.242.74.39 port 42144 ssh2 Apr 7 04:25:56 Tower sshd[18104]: Received disconnect from 43.242.74.39 port 42144:11: Bye Bye [preauth] Apr 7 04:25:56 Tower sshd[18104]: Disconnected from invalid user testftp 43.242.74.39 port 42144 [preauth] |
2020-04-07 20:14:22 |
212.21.11.44 | attack | Apr 7 13:34:22 * sshd[2508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.21.11.44 Apr 7 13:34:25 * sshd[2508]: Failed password for invalid user Minecraft from 212.21.11.44 port 40780 ssh2 |
2020-04-07 19:51:58 |
14.181.78.7 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.181.78.7 to port 445 |
2020-04-07 19:47:20 |
210.211.109.161 | attackspam | Unauthorized connection attempt from IP address 210.211.109.161 on Port 445(SMB) |
2020-04-07 19:42:33 |
94.177.246.39 | attackbots | Apr 7 10:04:38 OPSO sshd\[29325\]: Invalid user user2 from 94.177.246.39 port 35640 Apr 7 10:04:38 OPSO sshd\[29325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.246.39 Apr 7 10:04:40 OPSO sshd\[29325\]: Failed password for invalid user user2 from 94.177.246.39 port 35640 ssh2 Apr 7 10:09:23 OPSO sshd\[29877\]: Invalid user deploy from 94.177.246.39 port 45796 Apr 7 10:09:23 OPSO sshd\[29877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.246.39 |
2020-04-07 20:08:27 |
103.129.223.101 | attackspam | Apr 7 12:21:13 santamaria sshd\[23452\]: Invalid user uftp from 103.129.223.101 Apr 7 12:21:13 santamaria sshd\[23452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.101 Apr 7 12:21:16 santamaria sshd\[23452\]: Failed password for invalid user uftp from 103.129.223.101 port 57974 ssh2 ... |
2020-04-07 19:48:55 |
14.244.49.177 | attackbotsspam | Unauthorized connection attempt from IP address 14.244.49.177 on Port 445(SMB) |
2020-04-07 19:39:26 |
222.186.180.130 | attackspambots | Apr 7 13:54:21 santamaria sshd\[25093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root Apr 7 13:54:23 santamaria sshd\[25093\]: Failed password for root from 222.186.180.130 port 48175 ssh2 Apr 7 13:57:24 santamaria sshd\[25172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root ... |
2020-04-07 20:00:20 |
124.123.105.236 | attackspam | SSH Brute-Force Attack |
2020-04-07 20:02:38 |
27.72.45.154 | attackspambots | Unauthorized connection attempt from IP address 27.72.45.154 on Port 445(SMB) |
2020-04-07 19:41:59 |