City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.31.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.31.166. IN A
;; AUTHORITY SECTION:
. 511 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 20:34:12 CST 2022
;; MSG SIZE rcvd: 106
Host 166.31.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 166.31.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
203.128.246.230 | attackspam | Unauthorised access (Nov 11) SRC=203.128.246.230 LEN=52 TTL=120 ID=28312 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-12 03:23:13 |
172.105.213.140 | attackbots | firewall-block, port(s): 445/tcp |
2019-11-12 03:15:38 |
210.212.249.228 | attack | ssh failed login |
2019-11-12 03:41:55 |
104.245.39.37 | attack | Nov 11 17:40:55 XXX sshd[64287]: Invalid user ftpuser from 104.245.39.37 port 56800 |
2019-11-12 03:18:27 |
178.116.159.202 | attackspambots | 11/11/2019-18:27:10.974224 178.116.159.202 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 13 |
2019-11-12 03:24:37 |
219.142.28.206 | attackspambots | 2019-11-11T19:57:42.800974scmdmz1 sshd\[20044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.28.206 user=root 2019-11-11T19:57:44.653128scmdmz1 sshd\[20044\]: Failed password for root from 219.142.28.206 port 37056 ssh2 2019-11-11T20:01:42.793667scmdmz1 sshd\[20713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.28.206 user=admin ... |
2019-11-12 03:13:51 |
219.159.229.115 | attack | 'IP reached maximum auth failures for a one day block' |
2019-11-12 03:34:56 |
103.206.191.100 | attackspambots | Nov 11 18:03:12 XXXXXX sshd[63885]: Invalid user gopher from 103.206.191.100 port 55086 |
2019-11-12 03:03:45 |
193.31.24.113 | attackbots | 11/11/2019-20:25:52.066504 193.31.24.113 Protocol: 6 SURICATA SMTP tls rejected |
2019-11-12 03:26:17 |
200.56.3.29 | attack | Telnet Server BruteForce Attack |
2019-11-12 03:11:41 |
37.139.13.105 | attack | Nov 11 13:11:18 srv3 sshd\[25912\]: Invalid user postgres from 37.139.13.105 Nov 11 13:11:18 srv3 sshd\[25912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 Nov 11 13:11:20 srv3 sshd\[25912\]: Failed password for invalid user postgres from 37.139.13.105 port 49120 ssh2 ... |
2019-11-12 03:13:22 |
222.186.175.220 | attackbots | SSH Brute Force, server-1 sshd[12412]: Failed password for root from 222.186.175.220 port 50932 ssh2 |
2019-11-12 03:33:57 |
188.162.199.211 | attackspambots | 2019-11-11 13:41:00 auth_login authenticator failed for (localhost.localdomain) [188.162.199.211]: 535 Incorrect authentication data (set_id=info@oga.mk.ua) 2019-11-11 15:40:31 auth_login authenticator failed for (localhost.localdomain) [188.162.199.211]: 535 Incorrect authentication data (set_id=info@fordlipetsk.ru) ... |
2019-11-12 03:09:43 |
59.49.99.124 | attack | SSH invalid-user multiple login try |
2019-11-12 03:28:00 |
89.22.103.210 | attack | 89.22.103.210 - - \[11/Nov/2019:16:49:10 +0100\] "POST /wp-login.php HTTP/1.0" 200 5707 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 89.22.103.210 - - \[11/Nov/2019:16:49:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 5707 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 89.22.103.210 - - \[11/Nov/2019:16:49:11 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 802 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-12 03:11:10 |