City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.195.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.195.127. IN A
;; AUTHORITY SECTION:
. 464 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040301 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 04 14:06:38 CST 2022
;; MSG SIZE rcvd: 107
Host 127.195.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 127.195.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
185.220.102.6 | attackspam | Caught in portsentry honeypot |
2019-08-17 00:33:06 |
51.158.113.194 | attack | Aug 16 18:17:59 dedicated sshd[24937]: Invalid user Server2012 from 51.158.113.194 port 50122 |
2019-08-17 00:22:34 |
199.175.43.118 | attackspam | Port Scan: TCP/445 |
2019-08-16 23:56:58 |
91.202.76.141 | attack | [portscan] Port scan |
2019-08-17 00:23:59 |
42.238.11.57 | attackbotsspam | Port Scan: TCP/23 |
2019-08-16 23:51:09 |
114.4.197.7 | attackbotsspam | 445/tcp 445/tcp [2019-08-16]2pkt |
2019-08-16 23:41:46 |
223.199.155.40 | attack | Port Scan: TCP/21 |
2019-08-16 23:29:51 |
211.64.67.48 | attackspambots | Aug 16 06:10:43 web9 sshd\[20718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.64.67.48 user=root Aug 16 06:10:45 web9 sshd\[20718\]: Failed password for root from 211.64.67.48 port 48624 ssh2 Aug 16 06:17:50 web9 sshd\[22279\]: Invalid user protocol from 211.64.67.48 Aug 16 06:17:50 web9 sshd\[22279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.64.67.48 Aug 16 06:17:52 web9 sshd\[22279\]: Failed password for invalid user protocol from 211.64.67.48 port 37762 ssh2 |
2019-08-17 00:30:39 |
64.6.123.66 | attackspambots | Port Scan: UDP/137 |
2019-08-16 23:48:35 |
192.58.143.142 | attackspam | Port Scan: TCP/23 |
2019-08-16 23:33:28 |
177.102.111.102 | attackbotsspam | Port Scan: TCP/8080 |
2019-08-17 00:04:11 |
132.148.142.246 | attackbots | Port Scan: TCP/445 |
2019-08-17 00:10:45 |
106.13.99.245 | attackspam | Aug 16 13:11:42 rpi sshd[32740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.245 Aug 16 13:11:44 rpi sshd[32740]: Failed password for invalid user l4d2 from 106.13.99.245 port 55808 ssh2 |
2019-08-16 23:29:18 |
173.72.101.149 | attack | Hits on port 10900 used by some proxies |
2019-08-16 23:38:57 |
188.81.203.246 | attackbots | 2749/udp [2019-08-16]1pkt |
2019-08-16 23:25:57 |