City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.55.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.55.192. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:37:18 CST 2022
;; MSG SIZE rcvd: 106
Host 192.55.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 192.55.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
54.36.149.62 | attack | Automatic report - Banned IP Access |
2019-08-30 13:03:47 |
125.105.83.87 | attackbotsspam | Attack to wordpress xmlrpc |
2019-08-30 13:17:32 |
163.172.157.162 | attackspambots | Aug 30 02:02:25 xtremcommunity sshd\[7293\]: Invalid user oracle from 163.172.157.162 port 48564 Aug 30 02:02:25 xtremcommunity sshd\[7293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.162 Aug 30 02:02:27 xtremcommunity sshd\[7293\]: Failed password for invalid user oracle from 163.172.157.162 port 48564 ssh2 Aug 30 02:06:46 xtremcommunity sshd\[7467\]: Invalid user design from 163.172.157.162 port 36158 Aug 30 02:06:46 xtremcommunity sshd\[7467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.162 ... |
2019-08-30 14:08:17 |
201.162.105.225 | attackspam | Aug 29 18:44:16 lcdev sshd\[2691\]: Invalid user es@123 from 201.162.105.225 Aug 29 18:44:16 lcdev sshd\[2691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.162.105.225 Aug 29 18:44:18 lcdev sshd\[2691\]: Failed password for invalid user es@123 from 201.162.105.225 port 45653 ssh2 Aug 29 18:50:04 lcdev sshd\[3235\]: Invalid user ade from 201.162.105.225 Aug 29 18:50:04 lcdev sshd\[3235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.162.105.225 |
2019-08-30 13:06:50 |
223.25.62.75 | attackbots | Looking for resource vulnerabilities |
2019-08-30 13:04:41 |
5.199.130.188 | attackspam | Aug 29 19:54:25 lcdev sshd\[9356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de user=root Aug 29 19:54:27 lcdev sshd\[9356\]: Failed password for root from 5.199.130.188 port 39294 ssh2 Aug 29 19:54:38 lcdev sshd\[9356\]: Failed password for root from 5.199.130.188 port 39294 ssh2 Aug 29 19:54:41 lcdev sshd\[9356\]: Failed password for root from 5.199.130.188 port 39294 ssh2 Aug 29 19:55:27 lcdev sshd\[9453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de user=root |
2019-08-30 14:03:36 |
45.79.179.48 | attackspambots | firewall-block, port(s): 5683/udp |
2019-08-30 13:55:11 |
54.39.148.234 | attackspam | Aug 30 07:19:33 minden010 sshd[12420]: Failed password for root from 54.39.148.234 port 44534 ssh2 Aug 30 07:19:44 minden010 sshd[12420]: Failed password for root from 54.39.148.234 port 44534 ssh2 Aug 30 07:19:47 minden010 sshd[12420]: Failed password for root from 54.39.148.234 port 44534 ssh2 Aug 30 07:19:47 minden010 sshd[12420]: error: maximum authentication attempts exceeded for root from 54.39.148.234 port 44534 ssh2 [preauth] ... |
2019-08-30 13:23:18 |
121.50.170.124 | attackbots | SSH Brute-Force reported by Fail2Ban |
2019-08-30 13:18:27 |
112.27.93.110 | attack | Automatic report - Port Scan Attack |
2019-08-30 13:49:44 |
202.45.147.125 | attackbotsspam | Aug 29 19:45:39 web1 sshd\[8154\]: Invalid user testuser1 from 202.45.147.125 Aug 29 19:45:39 web1 sshd\[8154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.125 Aug 29 19:45:41 web1 sshd\[8154\]: Failed password for invalid user testuser1 from 202.45.147.125 port 38424 ssh2 Aug 29 19:49:53 web1 sshd\[8596\]: Invalid user ubuntu from 202.45.147.125 Aug 29 19:49:54 web1 sshd\[8596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.125 |
2019-08-30 14:01:13 |
104.248.229.8 | attack | Invalid user jcoffey from 104.248.229.8 port 39316 |
2019-08-30 13:19:11 |
46.101.77.58 | attackspam | Invalid user mb from 46.101.77.58 port 51499 |
2019-08-30 13:28:23 |
175.148.102.253 | attackspam | Autoban 175.148.102.253 AUTH/CONNECT |
2019-08-30 13:12:29 |
193.242.151.221 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-30 03:54:14,725 INFO [amun_request_handler] PortScan Detected on Port: 445 (193.242.151.221) |
2019-08-30 14:06:45 |