City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.31.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.31.242. IN A
;; AUTHORITY SECTION:
. 537 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 20:36:33 CST 2022
;; MSG SIZE rcvd: 106
Host 242.31.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.31.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
43.226.146.134 | attack | Apr 7 02:20:26 [host] sshd[8016]: Invalid user de Apr 7 02:20:26 [host] sshd[8016]: pam_unix(sshd:a Apr 7 02:20:28 [host] sshd[8016]: Failed password |
2020-04-07 08:22:58 |
89.248.160.150 | attack | 89.248.160.150 was recorded 18 times by 9 hosts attempting to connect to the following ports: 49182,49169,49157. Incident counter (4h, 24h, all-time): 18, 118, 10183 |
2020-04-07 08:21:44 |
222.186.173.226 | attack | Apr 7 02:10:43 vmanager6029 sshd\[853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root Apr 7 02:10:46 vmanager6029 sshd\[851\]: error: PAM: Authentication failure for root from 222.186.173.226 Apr 7 02:10:48 vmanager6029 sshd\[854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root |
2020-04-07 08:20:11 |
202.168.205.181 | attack | Apr 7 01:48:10 mout sshd[27650]: Invalid user admin from 202.168.205.181 port 23428 |
2020-04-07 08:20:27 |
51.91.69.20 | attack | 191 ports scanned over 24 hours. |
2020-04-07 08:07:07 |
222.236.198.50 | attackbotsspam | 2020-04-07T01:46:10.410603centos sshd[5657]: Invalid user ubuntu from 222.236.198.50 port 51534 2020-04-07T01:46:12.327233centos sshd[5657]: Failed password for invalid user ubuntu from 222.236.198.50 port 51534 ssh2 2020-04-07T01:48:14.826535centos sshd[5786]: Invalid user vmuser from 222.236.198.50 port 43388 ... |
2020-04-07 08:15:38 |
45.254.25.213 | attackspam | Apr 7 01:32:12 ovpn sshd\[3823\]: Invalid user deploy from 45.254.25.213 Apr 7 01:32:12 ovpn sshd\[3823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.254.25.213 Apr 7 01:32:14 ovpn sshd\[3823\]: Failed password for invalid user deploy from 45.254.25.213 port 56288 ssh2 Apr 7 01:48:29 ovpn sshd\[7623\]: Invalid user siva from 45.254.25.213 Apr 7 01:48:29 ovpn sshd\[7623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.254.25.213 |
2020-04-07 08:04:56 |
80.82.70.239 | attackbotsspam | Automatic report - Port Scan |
2020-04-07 08:00:38 |
170.246.86.69 | attackbotsspam | 20/4/6@20:13:04: FAIL: Alarm-Network address from=170.246.86.69 ... |
2020-04-07 08:27:22 |
111.67.193.176 | attackspambots | SSH Bruteforce attempt |
2020-04-07 08:31:50 |
106.12.60.40 | attack | Apr 7 02:11:43 eventyay sshd[3296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.60.40 Apr 7 02:11:45 eventyay sshd[3296]: Failed password for invalid user student from 106.12.60.40 port 42942 ssh2 Apr 7 02:14:29 eventyay sshd[3393]: Failed password for postgres from 106.12.60.40 port 47946 ssh2 ... |
2020-04-07 08:39:38 |
66.199.169.4 | attackbots | $f2bV_matches |
2020-04-07 08:28:34 |
148.66.135.178 | attackspam | Apr 7 04:44:07 gw1 sshd[24176]: Failed password for www-data from 148.66.135.178 port 36762 ssh2 ... |
2020-04-07 08:24:45 |
112.85.42.173 | attack | Apr 6 21:03:06 firewall sshd[31890]: Failed password for root from 112.85.42.173 port 1547 ssh2 Apr 6 21:03:09 firewall sshd[31890]: Failed password for root from 112.85.42.173 port 1547 ssh2 Apr 6 21:03:12 firewall sshd[31890]: Failed password for root from 112.85.42.173 port 1547 ssh2 ... |
2020-04-07 08:09:46 |
159.89.177.46 | attackspambots | Brute-force attempt banned |
2020-04-07 08:11:14 |