City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.40.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19061
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.40.95. IN A
;; AUTHORITY SECTION:
. 337 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 10:16:51 CST 2022
;; MSG SIZE rcvd: 105
Host 95.40.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 95.40.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
14.244.74.252 | attack | Unauthorized connection attempt detected from IP address 14.244.74.252 to port 445 |
2020-03-12 17:55:38 |
171.238.9.160 | attackspam | $f2bV_matches_ltvn |
2020-03-12 18:17:54 |
14.185.143.218 | attack | SSH bruteforce more then 50 syn to 22 port per 10 seconds. |
2020-03-12 18:06:46 |
46.0.203.166 | attackspambots | Automatic report: SSH brute force attempt |
2020-03-12 17:44:30 |
116.101.80.72 | attackspambots | $f2bV_matches |
2020-03-12 17:48:42 |
178.128.227.211 | attackspambots | Invalid user louis from 178.128.227.211 port 40604 |
2020-03-12 18:11:08 |
212.64.19.123 | attack | SSH Brute Force |
2020-03-12 18:02:39 |
122.51.41.26 | attackspambots | detected by Fail2Ban |
2020-03-12 18:14:30 |
164.68.118.217 | attackspam | Mar 12 07:30:19 master sshd[22209]: Failed password for invalid user www from 164.68.118.217 port 43668 ssh2 Mar 12 07:41:18 master sshd[22278]: Failed password for root from 164.68.118.217 port 52282 ssh2 Mar 12 07:45:12 master sshd[22301]: Failed password for invalid user ubuntu from 164.68.118.217 port 40922 ssh2 Mar 12 07:48:57 master sshd[22319]: Failed password for invalid user sandor from 164.68.118.217 port 57762 ssh2 Mar 12 07:54:43 master sshd[22339]: Failed password for invalid user dping from 164.68.118.217 port 46380 ssh2 Mar 12 07:59:46 master sshd[22363]: Failed password for root from 164.68.118.217 port 35012 ssh2 Mar 12 08:03:35 master sshd[22728]: Failed password for root from 164.68.118.217 port 51872 ssh2 Mar 12 08:07:21 master sshd[22740]: Failed password for invalid user jenkins from 164.68.118.217 port 40494 ssh2 Mar 12 08:11:07 master sshd[22785]: Failed password for root from 164.68.118.217 port 57352 ssh2 |
2020-03-12 18:07:21 |
118.24.212.64 | attackbotsspam | SSH Brute-Force reported by Fail2Ban |
2020-03-12 18:18:29 |
74.82.47.47 | attackspam | firewall-block, port(s): 10001/udp |
2020-03-12 17:42:44 |
187.189.241.135 | attack | Automatic report: SSH brute force attempt |
2020-03-12 17:44:02 |
145.239.239.83 | attack | Mar 12 11:03:11 ns382633 sshd\[8810\]: Invalid user gitlab-prometheus from 145.239.239.83 port 57342 Mar 12 11:03:11 ns382633 sshd\[8810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.239.83 Mar 12 11:03:13 ns382633 sshd\[8810\]: Failed password for invalid user gitlab-prometheus from 145.239.239.83 port 57342 ssh2 Mar 12 11:07:20 ns382633 sshd\[9700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.239.83 user=root Mar 12 11:07:23 ns382633 sshd\[9700\]: Failed password for root from 145.239.239.83 port 45560 ssh2 |
2020-03-12 18:07:51 |
5.135.181.53 | attack | Automatic report: SSH brute force attempt |
2020-03-12 18:04:21 |
213.171.216.60 | spam | MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord ! X-Originating-IP: [213.171.216.60] Received: from 10.200.77.176 (EHLO smtp.livemail.co.uk) (213.171.216.60) by mta1047.mail.ir2.yahoo.com with SMTPS; Received: from mvtp (unknown [188.162.198.188]) (Authenticated sender: web@keepfitwithkelly.co.uk) by smtp.livemail.co.uk (Postfix) with ESMTPSA id EB0D52805CD; Message-ID: <0d619dcec5ee3b3711a41241b573595531f1e6ff@keepfitwithkelly.co.uk> Reply-To: Jennifer From: Jennifer keepfitwithkelly.co.uk (FALSE EMPTY Web Site to STOP to host and destroiy IP and access keys !)>fasthosts.co.uk keepfitwithkelly.co.uk>88.208.252.239 88.208.252.239>fasthosts.co.uk https://www.mywot.com/scorecard/keepfitwithkelly.co.uk https://www.mywot.com/scorecard/fasthosts.co.uk https://en.asytech.cn/check-ip/88.208.252.239 ortaggi.co.uk>one.com>joker.com one.com>195.47.247.9 joker.com>194.245.148.200 194.245.148.200>nrw.net which resend to csl.de nrw.net>joker.com csl.de>nrw.net https://www.mywot.com/scorecard/one.com https://www.mywot.com/scorecard/joker.com https://www.mywot.com/scorecard/nrw.net https://www.mywot.com/scorecard/csl.de https://en.asytech.cn/check-ip/195.47.247.9 https://en.asytech.cn/check-ip/194.245.148.200 which send to : https://honeychicksfinder.com/pnguakzjfkmgrtk%3Ft%3Dshh&sa=D&sntz=1&usg=AFQjCNGvyrBCDGwYkoLXFlDkbYHNh0OsYg honeychicksfinder.com>gdpr-masked.com honeychicksfinder.com>104.27.137.81 gdpr-masked.com>endurance.com AGAIN... https://www.mywot.com/scorecard/honeychicksfinder.com https://www.mywot.com/scorecard/gdpr-masked.com https://www.mywot.com/scorecard/endurance.com https://en.asytech.cn/check-ip/104.27.137.81 |
2020-03-12 18:21:42 |