City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.42.190. IN A
;; AUTHORITY SECTION:
. 534 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 05:23:32 CST 2022
;; MSG SIZE rcvd: 106
Host 190.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 190.42.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
47.102.99.56 | attack | 404 NOT FOUND |
2019-10-10 18:45:46 |
222.186.42.15 | attack | $f2bV_matches |
2019-10-10 18:48:11 |
80.211.246.191 | attackbotsspam | SIPVicious Scanner Detection |
2019-10-10 18:42:06 |
218.76.158.162 | attackspambots | $f2bV_matches |
2019-10-10 19:10:46 |
141.98.10.61 | attack | Oct 10 08:12:53 heicom postfix/smtpd\[22505\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 08:38:22 heicom postfix/smtpd\[24234\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 09:04:00 heicom postfix/smtpd\[24234\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 09:29:34 heicom postfix/smtpd\[24429\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 09:55:21 heicom postfix/smtpd\[25606\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure ... |
2019-10-10 18:42:20 |
189.39.13.1 | attack | Oct 09 22:31:13 askasleikir sshd[380628]: Failed password for root from 189.39.13.1 port 44110 ssh2 |
2019-10-10 18:53:39 |
14.163.76.113 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 04:45:20. |
2019-10-10 18:37:58 |
137.135.113.76 | attackspam | Brute forcing RDP port 3389 |
2019-10-10 19:16:18 |
167.114.253.182 | attackbotsspam | www.handydirektreparatur.de 167.114.253.182 \[10/Oct/2019:05:45:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 5665 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.handydirektreparatur.de 167.114.253.182 \[10/Oct/2019:05:45:01 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4114 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-10 18:52:26 |
125.25.82.205 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 04:45:19. |
2019-10-10 18:39:20 |
121.142.111.242 | attackbots | Oct 10 12:03:14 XXX sshd[18509]: Invalid user ofsaa from 121.142.111.242 port 58638 |
2019-10-10 19:13:01 |
80.211.9.57 | attack | Oct 10 08:22:53 master sshd[7729]: Failed password for root from 80.211.9.57 port 50344 ssh2 Oct 10 08:38:32 master sshd[8079]: Failed password for root from 80.211.9.57 port 41368 ssh2 Oct 10 08:43:44 master sshd[8095]: Failed password for root from 80.211.9.57 port 53292 ssh2 Oct 10 08:47:45 master sshd[8124]: Failed password for root from 80.211.9.57 port 36988 ssh2 Oct 10 08:51:45 master sshd[8138]: Failed password for root from 80.211.9.57 port 48912 ssh2 Oct 10 08:55:45 master sshd[8146]: Failed password for root from 80.211.9.57 port 60836 ssh2 Oct 10 08:59:47 master sshd[8160]: Failed password for root from 80.211.9.57 port 44532 ssh2 Oct 10 09:03:46 master sshd[8480]: Failed password for root from 80.211.9.57 port 56454 ssh2 Oct 10 09:07:49 master sshd[8496]: Failed password for root from 80.211.9.57 port 40150 ssh2 Oct 10 09:11:52 master sshd[8510]: Failed password for root from 80.211.9.57 port 52074 ssh2 Oct 10 09:15:53 master sshd[8533]: Failed password for root from 80.211.9.57 port 35766 ssh2 O |
2019-10-10 18:47:42 |
14.170.18.91 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 04:45:20. |
2019-10-10 18:37:38 |
125.105.74.129 | attackspam | Lines containing failures of 125.105.74.129 Oct 10 05:38:30 srv02 sshd[8055]: Invalid user admin from 125.105.74.129 port 50421 Oct 10 05:38:30 srv02 sshd[8055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.105.74.129 Oct 10 05:38:32 srv02 sshd[8055]: Failed password for invalid user admin from 125.105.74.129 port 50421 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=125.105.74.129 |
2019-10-10 18:50:13 |
186.156.177.115 | attackbotsspam | Oct 10 12:41:34 meumeu sshd[4269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.156.177.115 Oct 10 12:41:36 meumeu sshd[4269]: Failed password for invalid user Cent0s1234 from 186.156.177.115 port 55300 ssh2 Oct 10 12:46:56 meumeu sshd[5360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.156.177.115 ... |
2019-10-10 19:04:17 |