City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.41.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.41.93. IN A
;; AUTHORITY SECTION:
. 543 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 10:21:49 CST 2022
;; MSG SIZE rcvd: 105
Host 93.41.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 93.41.21.104.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 123.18.206.15 | attack | 2020-07-04T10:51:37.251268mail.standpoint.com.ua sshd[31838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15 2020-07-04T10:51:37.248492mail.standpoint.com.ua sshd[31838]: Invalid user bass from 123.18.206.15 port 48117 2020-07-04T10:51:39.058283mail.standpoint.com.ua sshd[31838]: Failed password for invalid user bass from 123.18.206.15 port 48117 ssh2 2020-07-04T10:55:13.834769mail.standpoint.com.ua sshd[32277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15 user=root 2020-07-04T10:55:15.295516mail.standpoint.com.ua sshd[32277]: Failed password for root from 123.18.206.15 port 46193 ssh2 ... |
2020-07-04 16:04:11 |
| 139.155.71.154 | attackspam | Jul 4 14:20:15 webhost01 sshd[24575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.71.154 Jul 4 14:20:16 webhost01 sshd[24575]: Failed password for invalid user randy from 139.155.71.154 port 50652 ssh2 ... |
2020-07-04 16:17:32 |
| 139.215.208.74 | attackspam | firewall-block, port(s): 12589/tcp |
2020-07-04 16:20:19 |
| 218.92.0.250 | attack | Jul 4 10:03:32 vmd17057 sshd[2271]: Failed password for root from 218.92.0.250 port 21589 ssh2 Jul 4 10:03:38 vmd17057 sshd[2271]: Failed password for root from 218.92.0.250 port 21589 ssh2 ... |
2020-07-04 16:03:54 |
| 113.193.244.2 | attackbots | firewall-block, port(s): 445/tcp |
2020-07-04 16:27:02 |
| 111.72.196.74 | attackspam | Jul 4 09:41:23 srv01 postfix/smtpd\[20842\]: warning: unknown\[111.72.196.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 09:41:35 srv01 postfix/smtpd\[20842\]: warning: unknown\[111.72.196.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 09:41:51 srv01 postfix/smtpd\[20842\]: warning: unknown\[111.72.196.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 09:42:09 srv01 postfix/smtpd\[20842\]: warning: unknown\[111.72.196.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 09:42:22 srv01 postfix/smtpd\[20842\]: warning: unknown\[111.72.196.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-04 15:54:29 |
| 106.75.56.56 | attackbotsspam | Jul 4 09:07:01 server sshd[21431]: Failed password for root from 106.75.56.56 port 50571 ssh2 Jul 4 09:16:16 server sshd[32137]: Failed password for invalid user francis from 106.75.56.56 port 60938 ssh2 Jul 4 09:20:26 server sshd[4318]: Failed password for invalid user vmi from 106.75.56.56 port 52007 ssh2 |
2020-07-04 16:02:55 |
| 193.70.88.213 | attack | Jul 4 09:01:25 server sshd[28985]: Failed password for invalid user user from 193.70.88.213 port 39230 ssh2 Jul 4 09:17:10 server sshd[40947]: Failed password for invalid user mysql from 193.70.88.213 port 45606 ssh2 Jul 4 09:20:32 server sshd[43775]: Failed password for invalid user kk from 193.70.88.213 port 43334 ssh2 |
2020-07-04 15:56:23 |
| 122.51.167.108 | attackspam | Jul 4 09:29:33 OPSO sshd\[29434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.108 user=root Jul 4 09:29:34 OPSO sshd\[29434\]: Failed password for root from 122.51.167.108 port 58622 ssh2 Jul 4 09:33:05 OPSO sshd\[30314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.108 user=root Jul 4 09:33:07 OPSO sshd\[30314\]: Failed password for root from 122.51.167.108 port 46604 ssh2 Jul 4 09:36:34 OPSO sshd\[31335\]: Invalid user daniel from 122.51.167.108 port 34558 Jul 4 09:36:34 OPSO sshd\[31335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.108 |
2020-07-04 15:53:14 |
| 62.210.180.62 | attackspambots | 62.210.180.62 - - \[04/Jul/2020:07:20:14 +0000\] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/80.0.3987.149 Safari/537.36" "-"62.210.180.62 - - \[04/Jul/2020:07:20:14 +0000\] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/80.0.3987.149 Safari/537.36" "-"62.210.180.62 - - \[04/Jul/2020:07:20:14 +0000\] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/80.0.3987.149 Safari/537.36" "-"62.210.180.62 - - \[04/Jul/2020:07:20:14 +0000\] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/80.0.3987.149 Safari/537.36" "-"62.210.180.62 - - \[04/Jul/2020:07:20:14 +0000\] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 |
2020-07-04 16:21:03 |
| 212.129.50.243 | attackbotsspam | FR - - [04/Jul/2020:01:53:07 +0300] GET /go.php?http://cialisfcanada.com/ HTTP/1.1 403 292 - Mozilla/5.0 compatible; BarkRowler/0.9; +https://babbar.tech/crawler |
2020-07-04 16:09:48 |
| 121.172.82.73 | attack | " " |
2020-07-04 15:51:12 |
| 54.38.242.206 | attackspam | Jul 4 09:20:26 rancher-0 sshd[123216]: Invalid user lingxi from 54.38.242.206 port 36164 Jul 4 09:20:27 rancher-0 sshd[123216]: Failed password for invalid user lingxi from 54.38.242.206 port 36164 ssh2 ... |
2020-07-04 16:03:19 |
| 23.229.57.248 | attackspam | US - - [03/Jul/2020:16:42:27 +0300] GET /go.php?https://www.aishamassage.com%2Ftantric-massage-in-london%2F HTTP/1.0 403 292 http://www.forseo.ru/ Mozilla/5.0 Windows NT 6.3; WOW64 AppleWebKit/537.36 KHTML, like Gecko Chrome/64.0.3282.186 YaBrowser/18.3.1.1232 Yowser/2.5 Safari/537.36 |
2020-07-04 15:57:18 |
| 216.218.206.79 | attackbots | Port scan: Attack repeated for 24 hours |
2020-07-04 16:11:04 |