City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.42.92. IN A
;; AUTHORITY SECTION:
. 276 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:29:58 CST 2022
;; MSG SIZE rcvd: 105
Host 92.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 92.42.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
92.118.205.144 | attack | Lines containing failures of 92.118.205.144 Apr 22 23:13:49 mailserver sshd[31826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.205.144 user=r.r Apr 22 23:13:52 mailserver sshd[31826]: Failed password for r.r from 92.118.205.144 port 34634 ssh2 Apr 22 23:13:52 mailserver sshd[31826]: Received disconnect from 92.118.205.144 port 34634:11: Bye Bye [preauth] Apr 22 23:13:52 mailserver sshd[31826]: Disconnected from authenticating user r.r 92.118.205.144 port 34634 [preauth] Apr 22 23:24:53 mailserver sshd[682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.205.144 user=r.r Apr 22 23:24:55 mailserver sshd[682]: Failed password for r.r from 92.118.205.144 port 36426 ssh2 Apr 22 23:24:55 mailserver sshd[682]: Received disconnect from 92.118.205.144 port 36426:11: Bye Bye [preauth] Apr 22 23:24:55 mailserver sshd[682]: Disconnected from authenticating user r.r 92.118.205.144 po........ ------------------------------ |
2020-04-24 22:54:37 |
195.154.243.192 | attack | Apr 23 06:13:49 emma postfix/smtpd[32477]: connect from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192] Apr 23 06:13:49 emma postfix/smtpd[32477]: setting up TLS connection from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192] Apr 23 06:13:50 emma postfix/smtpd[32477]: TLS connection established from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192]: TLSv1 whostnameh cipher ADH-AES256-SHA (256/256 bhostnames) Apr x@x Apr 23 06:14:05 emma postfix/smtpd[32477]: disconnect from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192] Apr 23 06:20:05 emma postfix/smtpd[754]: connect from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192] Apr 23 06:20:05 emma postfix/smtpd[754]: setting up TLS connection from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192] Apr 23 06:20:05 emma postfix/smtpd[754]: TLS connection established from 195-154-243-192.rev.poneytelecom.eu[195.154.243.192]: TLSv1 whostnameh cipher ADH-AES256-SHA (256/256 bhostnames) Apr x@x Apr 23 06:20........ ------------------------------- |
2020-04-24 23:25:11 |
5.129.145.176 | attack | port scan and connect, tcp 23 (telnet) |
2020-04-24 23:11:10 |
101.255.81.91 | attackbots | Apr 24 16:38:05 electroncash sshd[52583]: Invalid user teamspeak from 101.255.81.91 port 49846 Apr 24 16:38:05 electroncash sshd[52583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.81.91 Apr 24 16:38:05 electroncash sshd[52583]: Invalid user teamspeak from 101.255.81.91 port 49846 Apr 24 16:38:07 electroncash sshd[52583]: Failed password for invalid user teamspeak from 101.255.81.91 port 49846 ssh2 Apr 24 16:42:47 electroncash sshd[53938]: Invalid user multirode from 101.255.81.91 port 35038 ... |
2020-04-24 23:21:00 |
61.93.201.198 | attackbots | Apr 24 17:56:46 Enigma sshd[2072]: Invalid user andrew from 61.93.201.198 port 41619 Apr 24 17:56:46 Enigma sshd[2072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=061093201198.ctinets.com Apr 24 17:56:46 Enigma sshd[2072]: Invalid user andrew from 61.93.201.198 port 41619 Apr 24 17:56:48 Enigma sshd[2072]: Failed password for invalid user andrew from 61.93.201.198 port 41619 ssh2 Apr 24 17:59:47 Enigma sshd[2175]: Invalid user anne123 from 61.93.201.198 port 38076 |
2020-04-24 23:15:54 |
35.202.129.108 | attackbots | Apr 24 12:34:39 web8 sshd\[16396\]: Invalid user spotlight from 35.202.129.108 Apr 24 12:34:39 web8 sshd\[16396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.129.108 Apr 24 12:34:41 web8 sshd\[16396\]: Failed password for invalid user spotlight from 35.202.129.108 port 45046 ssh2 Apr 24 12:37:42 web8 sshd\[18046\]: Invalid user larissa from 35.202.129.108 Apr 24 12:37:42 web8 sshd\[18046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.129.108 |
2020-04-24 22:42:22 |
173.44.164.127 | attackspambots | (From eric@talkwithwebvisitor.com) Cool website! My name’s Eric, and I just found your site - performancechiroofga.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool. But if you don’t mind me asking – after someone like me stumbles across performancechiroofga.com, what usually happens? Is your site generating leads for your business? I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace. Not good. Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.” You can – Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number. It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally look |
2020-04-24 23:19:22 |
178.88.63.155 | attackbots | Apr 24 14:07:23 debian-2gb-nbg1-2 kernel: \[9988987.892603\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=178.88.63.155 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x20 TTL=115 ID=6292 DF PROTO=TCP SPT=60617 DPT=21 WINDOW=8192 RES=0x00 SYN URGP=0 |
2020-04-24 22:40:58 |
5.135.179.165 | attack | $f2bV_matches |
2020-04-24 22:46:25 |
222.186.175.217 | attackbotsspam | [ssh] SSH attack |
2020-04-24 23:01:16 |
110.77.236.212 | attackspam | failed_logins |
2020-04-24 22:44:34 |
49.88.112.68 | attackspambots | Apr 24 16:41:02 v22018053744266470 sshd[17058]: Failed password for root from 49.88.112.68 port 37074 ssh2 Apr 24 16:41:04 v22018053744266470 sshd[17058]: Failed password for root from 49.88.112.68 port 37074 ssh2 Apr 24 16:41:06 v22018053744266470 sshd[17058]: Failed password for root from 49.88.112.68 port 37074 ssh2 ... |
2020-04-24 22:45:00 |
27.115.51.162 | attack | Apr 24 04:15:48 web1 sshd\[14959\]: Invalid user demo from 27.115.51.162 Apr 24 04:15:48 web1 sshd\[14959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.51.162 Apr 24 04:15:51 web1 sshd\[14959\]: Failed password for invalid user demo from 27.115.51.162 port 58229 ssh2 Apr 24 04:19:41 web1 sshd\[15333\]: Invalid user gmmisdt from 27.115.51.162 Apr 24 04:19:41 web1 sshd\[15333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.51.162 |
2020-04-24 22:51:12 |
43.240.247.234 | attack | fail2ban |
2020-04-24 22:40:31 |
88.32.154.37 | attack | Apr 24 14:34:54 plex sshd[21870]: Invalid user azure from 88.32.154.37 port 63971 |
2020-04-24 22:52:04 |