City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.29.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.29.49. IN A
;; AUTHORITY SECTION:
. 235 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:22:15 CST 2022
;; MSG SIZE rcvd: 105
Host 49.29.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 49.29.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
83.99.244.76 | normal | Web-Hosting |
2020-06-06 14:54:14 |
128.199.152.38 | attackspambots | Jun 6 07:22:40 vps339862 kernel: \[10639875.858294\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=128.199.152.38 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=23178 PROTO=TCP SPT=48861 DPT=8086 SEQ=2500889399 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 6 07:22:50 vps339862 kernel: \[10639885.810288\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=128.199.152.38 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=61743 PROTO=TCP SPT=48861 DPT=9010 SEQ=2391415862 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 6 07:24:25 vps339862 kernel: \[10639980.911446\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=128.199.152.38 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=27582 PROTO=TCP SPT=48861 DPT=8009 SEQ=2172893916 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 6 07:31:26 vps339862 kernel: \[10640401.798543\] \[iptables\] PORT DENIED: IN=eth0 OUT= M ... |
2020-06-06 14:28:47 |
78.160.53.76 | attackbotsspam | 1591417093 - 06/06/2020 06:18:13 Host: 78.160.53.76/78.160.53.76 Port: 445 TCP Blocked |
2020-06-06 14:44:10 |
142.93.242.246 | attack | $f2bV_matches |
2020-06-06 14:49:59 |
174.138.64.163 | attackspam | Jun 6 06:03:08 roki sshd[14751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.64.163 user=root Jun 6 06:03:10 roki sshd[14751]: Failed password for root from 174.138.64.163 port 52488 ssh2 Jun 6 06:14:52 roki sshd[15566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.64.163 user=root Jun 6 06:14:54 roki sshd[15566]: Failed password for root from 174.138.64.163 port 56196 ssh2 Jun 6 06:17:52 roki sshd[15769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.64.163 user=root ... |
2020-06-06 15:15:56 |
186.215.235.9 | attackbotsspam | $f2bV_matches |
2020-06-06 14:46:33 |
195.54.161.41 | attack | 06/06/2020-02:34:22.323010 195.54.161.41 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-06 14:37:08 |
200.105.194.242 | attackbotsspam | 2020-06-06T07:18:34.322761vps751288.ovh.net sshd\[3525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.194.242 user=root 2020-06-06T07:18:35.770325vps751288.ovh.net sshd\[3525\]: Failed password for root from 200.105.194.242 port 11178 ssh2 2020-06-06T07:21:57.708668vps751288.ovh.net sshd\[3531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.194.242 user=root 2020-06-06T07:21:59.025600vps751288.ovh.net sshd\[3531\]: Failed password for root from 200.105.194.242 port 63323 ssh2 2020-06-06T07:25:17.065275vps751288.ovh.net sshd\[3557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.105.194.242 user=root |
2020-06-06 14:33:50 |
195.54.166.45 | attackbots | Ports scanned 17 times since 2020-05-31T00:07:48Z |
2020-06-06 14:29:41 |
222.124.17.227 | attack | Jun 5 18:09:39 tdfoods sshd\[31659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.17.227 user=root Jun 5 18:09:40 tdfoods sshd\[31659\]: Failed password for root from 222.124.17.227 port 53950 ssh2 Jun 5 18:13:43 tdfoods sshd\[31959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.17.227 user=root Jun 5 18:13:45 tdfoods sshd\[31959\]: Failed password for root from 222.124.17.227 port 57840 ssh2 Jun 5 18:18:02 tdfoods sshd\[32268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.17.227 user=root |
2020-06-06 15:02:04 |
49.233.173.90 | attackbots | Jun 6 07:39:24 eventyay sshd[4651]: Failed password for root from 49.233.173.90 port 50372 ssh2 Jun 6 07:42:48 eventyay sshd[4778]: Failed password for root from 49.233.173.90 port 60758 ssh2 ... |
2020-06-06 14:37:56 |
193.27.228.13 | attack | [MK-Root1] Blocked by UFW |
2020-06-06 15:03:07 |
101.69.200.162 | attackspambots | Jun 6 08:37:09 vps647732 sshd[11887]: Failed password for root from 101.69.200.162 port 15849 ssh2 ... |
2020-06-06 14:48:15 |
49.88.112.112 | attackspambots | $f2bV_matches |
2020-06-06 14:50:31 |
177.36.33.175 | attack | (smtpauth) Failed SMTP AUTH login from 177.36.33.175 (BR/Brazil/177-36-33-175.avato.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-06 08:47:48 plain authenticator failed for ([177.36.33.175]) [177.36.33.175]: 535 Incorrect authentication data (set_id=sourenco.cominfo@sourenco.com) |
2020-06-06 15:08:29 |