City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.50.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.50.195. IN A
;; AUTHORITY SECTION:
. 432 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 23:32:37 CST 2022
;; MSG SIZE rcvd: 106
Host 195.50.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 195.50.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
94.191.8.31 | attackbotsspam | $f2bV_matches |
2019-09-11 11:03:29 |
187.8.159.140 | attack | Sep 10 22:34:36 ny01 sshd[26193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.8.159.140 Sep 10 22:34:38 ny01 sshd[26193]: Failed password for invalid user webadmin from 187.8.159.140 port 40429 ssh2 Sep 10 22:43:00 ny01 sshd[27796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.8.159.140 |
2019-09-11 10:46:57 |
45.64.11.202 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 12:11:38,977 INFO [shellcode_manager] (45.64.11.202) no match, writing hexdump (b3813172b24b19d121fdfecfbce87179 :2121829) - MS17010 (EternalBlue) |
2019-09-11 11:17:58 |
139.99.62.10 | attackbotsspam | Sep 10 17:07:47 friendsofhawaii sshd\[27694\]: Invalid user student from 139.99.62.10 Sep 10 17:07:47 friendsofhawaii sshd\[27694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia Sep 10 17:07:49 friendsofhawaii sshd\[27694\]: Failed password for invalid user student from 139.99.62.10 port 42312 ssh2 Sep 10 17:14:43 friendsofhawaii sshd\[28448\]: Invalid user q3server from 139.99.62.10 Sep 10 17:14:43 friendsofhawaii sshd\[28448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.ecoit.asia |
2019-09-11 11:17:28 |
47.22.135.70 | attack | 2019-08-27T20:41:01.783474wiz-ks3 sshd[7483]: Invalid user deployment from 47.22.135.70 port 59224 2019-08-27T20:41:01.785592wiz-ks3 sshd[7483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f168746.static.optonline.net 2019-08-27T20:41:01.783474wiz-ks3 sshd[7483]: Invalid user deployment from 47.22.135.70 port 59224 2019-08-27T20:41:03.529303wiz-ks3 sshd[7483]: Failed password for invalid user deployment from 47.22.135.70 port 59224 ssh2 2019-08-27T20:52:58.511605wiz-ks3 sshd[7509]: Invalid user helen from 47.22.135.70 port 35552 2019-08-27T20:52:58.513839wiz-ks3 sshd[7509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f168746.static.optonline.net 2019-08-27T20:52:58.511605wiz-ks3 sshd[7509]: Invalid user helen from 47.22.135.70 port 35552 2019-08-27T20:53:00.021738wiz-ks3 sshd[7509]: Failed password for invalid user helen from 47.22.135.70 port 35552 ssh2 2019-08-27T20:57:03.022605wiz-ks3 sshd[7517]: Invalid user |
2019-09-11 11:08:13 |
118.24.37.81 | attackbots | Sep 10 16:58:30 hpm sshd\[8839\]: Invalid user 123456 from 118.24.37.81 Sep 10 16:58:30 hpm sshd\[8839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.37.81 Sep 10 16:58:32 hpm sshd\[8839\]: Failed password for invalid user 123456 from 118.24.37.81 port 41848 ssh2 Sep 10 17:04:15 hpm sshd\[9432\]: Invalid user password from 118.24.37.81 Sep 10 17:04:15 hpm sshd\[9432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.37.81 |
2019-09-11 11:13:17 |
189.187.214.162 | attackbotsspam | firewall-block, port(s): 23/tcp |
2019-09-11 11:24:07 |
222.189.41.46 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-11 11:30:10 |
185.43.209.203 | attackspambots | UTC: 2019-09-10 pkts: 3 port: 81/tcp |
2019-09-11 11:14:20 |
159.203.199.8 | attack | " " |
2019-09-11 11:18:56 |
182.61.11.3 | attackbots | Sep 11 02:21:04 MK-Soft-VM4 sshd\[13672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.11.3 user=root Sep 11 02:21:06 MK-Soft-VM4 sshd\[13672\]: Failed password for root from 182.61.11.3 port 42864 ssh2 Sep 11 02:28:25 MK-Soft-VM4 sshd\[17906\]: Invalid user 83 from 182.61.11.3 port 46568 Sep 11 02:28:25 MK-Soft-VM4 sshd\[17906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.11.3 ... |
2019-09-11 11:28:13 |
221.208.119.243 | attackbotsspam | Sep 10 23:49:44 xb0 sshd[6776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.208.119.243 user=r.r Sep 10 23:49:46 xb0 sshd[6776]: Failed password for r.r from 221.208.119.243 port 34727 ssh2 Sep 10 23:49:49 xb0 sshd[6776]: Failed password for r.r from 221.208.119.243 port 34727 ssh2 Sep 10 23:49:51 xb0 sshd[6776]: Failed password for r.r from 221.208.119.243 port 34727 ssh2 Sep 10 23:49:51 xb0 sshd[6776]: Disconnecting: Too many authentication failures for r.r from 221.208.119.243 port 34727 ssh2 [preauth] Sep 10 23:49:51 xb0 sshd[6776]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.208.119.243 user=r.r Sep 10 23:50:03 xb0 sshd[6807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.208.119.243 user=r.r Sep 10 23:50:04 xb0 sshd[6807]: Failed password for r.r from 221.208.119.243 port 34729 ssh2 Sep 10 23:50:07 xb0 sshd[6807]: Failed password ........ ------------------------------- |
2019-09-11 11:29:43 |
62.48.150.175 | attackspam | Sep 10 19:25:47 lanister sshd[1883]: Invalid user ts3server from 62.48.150.175 Sep 10 19:25:47 lanister sshd[1883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175 Sep 10 19:25:47 lanister sshd[1883]: Invalid user ts3server from 62.48.150.175 Sep 10 19:25:48 lanister sshd[1883]: Failed password for invalid user ts3server from 62.48.150.175 port 39174 ssh2 ... |
2019-09-11 10:56:49 |
43.226.40.60 | attackspam | Sep 11 04:38:59 vps647732 sshd[3155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.40.60 Sep 11 04:39:01 vps647732 sshd[3155]: Failed password for invalid user Passw0rd from 43.226.40.60 port 54466 ssh2 ... |
2019-09-11 10:44:30 |
203.199.141.158 | attackspam | Sep 10 22:10:59 thevastnessof sshd[17844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.141.158 ... |
2019-09-11 10:47:51 |