City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.50.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.50.253. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:34:53 CST 2022
;; MSG SIZE rcvd: 106
Host 253.50.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 253.50.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
218.87.96.224 | attackspam | Invalid user hy from 218.87.96.224 port 44878 |
2020-07-28 14:25:39 |
222.186.175.169 | attack | Jul 28 06:11:14 localhost sshd[74176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Jul 28 06:11:17 localhost sshd[74176]: Failed password for root from 222.186.175.169 port 21208 ssh2 Jul 28 06:11:20 localhost sshd[74176]: Failed password for root from 222.186.175.169 port 21208 ssh2 Jul 28 06:11:14 localhost sshd[74176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Jul 28 06:11:17 localhost sshd[74176]: Failed password for root from 222.186.175.169 port 21208 ssh2 Jul 28 06:11:20 localhost sshd[74176]: Failed password for root from 222.186.175.169 port 21208 ssh2 Jul 28 06:11:14 localhost sshd[74176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Jul 28 06:11:17 localhost sshd[74176]: Failed password for root from 222.186.175.169 port 21208 ssh2 Jul 28 06:11:20 localhost sshd[74 ... |
2020-07-28 14:16:12 |
66.225.225.225 | attackspam | 3478/udp 3478/udp 3478/udp... [2020-07-28]10pkt,1pt.(udp) |
2020-07-28 14:46:03 |
161.35.104.69 | attackbotsspam | 161.35.104.69 - - [28/Jul/2020:07:52:54 +0200] "GET /wp-login.php HTTP/1.1" 200 6398 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 161.35.104.69 - - [28/Jul/2020:07:52:59 +0200] "POST /wp-login.php HTTP/1.1" 200 6649 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 161.35.104.69 - - [28/Jul/2020:07:53:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-07-28 14:47:43 |
171.25.193.78 | attack | Jul 28 05:51:55 IngegnereFirenze sshd[11944]: User sshd from 171.25.193.78 not allowed because not listed in AllowUsers ... |
2020-07-28 14:43:57 |
218.255.86.106 | attackbotsspam | Invalid user chenzy from 218.255.86.106 port 44673 |
2020-07-28 14:08:07 |
5.62.63.82 | attackspambots | Forbidden directory scan :: 2020/07/28 03:54:58 [error] 3005#3005: *280558 access forbidden by rule, client: 5.62.63.82, server: [censored_1], request: "GET /.git//index HTTP/1.1", host: "www.[censored_1]" |
2020-07-28 14:47:20 |
118.24.83.41 | attackbots | 2020-07-28T07:02:55.492818vps773228.ovh.net sshd[4019]: Invalid user zhangjunli from 118.24.83.41 port 54136 2020-07-28T07:02:55.511391vps773228.ovh.net sshd[4019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.83.41 2020-07-28T07:02:55.492818vps773228.ovh.net sshd[4019]: Invalid user zhangjunli from 118.24.83.41 port 54136 2020-07-28T07:02:57.241473vps773228.ovh.net sshd[4019]: Failed password for invalid user zhangjunli from 118.24.83.41 port 54136 ssh2 2020-07-28T07:05:57.015396vps773228.ovh.net sshd[4067]: Invalid user xywei from 118.24.83.41 port 57980 ... |
2020-07-28 14:45:14 |
180.76.53.208 | attackspambots | Jul 28 00:49:11 ws12vmsma01 sshd[36212]: Invalid user liyuanlin from 180.76.53.208 Jul 28 00:49:13 ws12vmsma01 sshd[36212]: Failed password for invalid user liyuanlin from 180.76.53.208 port 40954 ssh2 Jul 28 00:53:52 ws12vmsma01 sshd[36935]: Invalid user xuyc from 180.76.53.208 ... |
2020-07-28 14:16:38 |
27.214.128.169 | attackspambots | prod8 ... |
2020-07-28 14:20:42 |
119.45.142.72 | attackspambots | Jul 28 10:49:23 itv-usvr-02 sshd[15786]: Invalid user clog from 119.45.142.72 port 56592 Jul 28 10:49:23 itv-usvr-02 sshd[15786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.142.72 Jul 28 10:49:23 itv-usvr-02 sshd[15786]: Invalid user clog from 119.45.142.72 port 56592 Jul 28 10:49:25 itv-usvr-02 sshd[15786]: Failed password for invalid user clog from 119.45.142.72 port 56592 ssh2 Jul 28 10:55:10 itv-usvr-02 sshd[16004]: Invalid user tecnico from 119.45.142.72 port 58502 |
2020-07-28 14:29:13 |
222.186.190.2 | attackspambots | Jul 28 08:36:50 vps1 sshd[27826]: Failed none for invalid user root from 222.186.190.2 port 18172 ssh2 Jul 28 08:36:54 vps1 sshd[27826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Jul 28 08:36:56 vps1 sshd[27826]: Failed password for invalid user root from 222.186.190.2 port 18172 ssh2 Jul 28 08:37:02 vps1 sshd[27826]: Failed password for invalid user root from 222.186.190.2 port 18172 ssh2 Jul 28 08:37:05 vps1 sshd[27826]: Failed password for invalid user root from 222.186.190.2 port 18172 ssh2 Jul 28 08:37:09 vps1 sshd[27826]: Failed password for invalid user root from 222.186.190.2 port 18172 ssh2 Jul 28 08:37:14 vps1 sshd[27826]: Failed password for invalid user root from 222.186.190.2 port 18172 ssh2 Jul 28 08:37:14 vps1 sshd[27826]: error: maximum authentication attempts exceeded for invalid user root from 222.186.190.2 port 18172 ssh2 [preauth] ... |
2020-07-28 14:39:52 |
5.62.20.32 | attack | (From filomena.cates67@msn.com) Looking for fresh buyers? Receive tons of keyword targeted visitors directly to your site. Boost revenues quick. Start seeing results in as little as 48 hours. For more info Check out: https://bit.ly/more-website-visits |
2020-07-28 14:13:56 |
140.143.93.31 | attackspam | 2020-07-28T07:12:52.349270+02:00 |
2020-07-28 14:09:26 |
106.13.123.29 | attackbots | 2020-07-28T04:38:22.867383shield sshd\[26969\]: Invalid user wangnanhui from 106.13.123.29 port 41916 2020-07-28T04:38:22.876515shield sshd\[26969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.29 2020-07-28T04:38:24.389865shield sshd\[26969\]: Failed password for invalid user wangnanhui from 106.13.123.29 port 41916 ssh2 2020-07-28T04:41:47.987442shield sshd\[27906\]: Invalid user oradev from 106.13.123.29 port 56964 2020-07-28T04:41:47.995775shield sshd\[27906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.29 |
2020-07-28 14:36:55 |