City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.57.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.57.81. IN A
;; AUTHORITY SECTION:
. 388 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 00:36:15 CST 2022
;; MSG SIZE rcvd: 105
Host 81.57.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.57.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
206.81.16.252 | attackbotsspam | LGS,WP GET /wp-login.php |
2020-09-06 05:01:32 |
45.145.67.39 | attackspambots | 3341/tcp 3000/tcp 4000/tcp... [2020-08-12/09-05]284pkt,86pt.(tcp) |
2020-09-06 05:07:27 |
106.54.123.84 | attackbotsspam | 2020-09-05T17:43:49.862101shield sshd\[22121\]: Invalid user emily from 106.54.123.84 port 36456 2020-09-05T17:43:49.871337shield sshd\[22121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 2020-09-05T17:43:52.161300shield sshd\[22121\]: Failed password for invalid user emily from 106.54.123.84 port 36456 ssh2 2020-09-05T17:45:24.224832shield sshd\[22259\]: Invalid user zt from 106.54.123.84 port 52580 2020-09-05T17:45:24.234498shield sshd\[22259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 |
2020-09-06 05:19:56 |
188.26.125.126 | attack | Automatic report - Banned IP Access |
2020-09-06 05:07:44 |
183.166.137.124 | attackbots | Sep 5 19:41:29 srv01 postfix/smtpd\[30709\]: warning: unknown\[183.166.137.124\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 19:41:41 srv01 postfix/smtpd\[30709\]: warning: unknown\[183.166.137.124\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 19:41:57 srv01 postfix/smtpd\[30709\]: warning: unknown\[183.166.137.124\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 19:42:17 srv01 postfix/smtpd\[30709\]: warning: unknown\[183.166.137.124\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 19:42:28 srv01 postfix/smtpd\[30709\]: warning: unknown\[183.166.137.124\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-06 04:51:01 |
85.206.165.172 | attackspam | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-09-06 05:16:42 |
184.105.247.231 | attackspambots | srv02 Mass scanning activity detected Target: 9200 .. |
2020-09-06 05:14:12 |
49.233.31.121 | attackbots | SSH Login Bruteforce |
2020-09-06 05:11:58 |
193.169.253.138 | attack | Sep 5 22:44:50 srv01 postfix/smtpd\[12513\]: warning: unknown\[193.169.253.138\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 22:44:56 srv01 postfix/smtpd\[12513\]: warning: unknown\[193.169.253.138\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 22:45:07 srv01 postfix/smtpd\[12513\]: warning: unknown\[193.169.253.138\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 22:45:31 srv01 postfix/smtpd\[15481\]: warning: unknown\[193.169.253.138\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 22:45:38 srv01 postfix/smtpd\[12513\]: warning: unknown\[193.169.253.138\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-06 05:06:20 |
222.186.173.142 | attackspambots | Sep 5 22:47:42 nextcloud sshd\[13270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root Sep 5 22:47:44 nextcloud sshd\[13270\]: Failed password for root from 222.186.173.142 port 30550 ssh2 Sep 5 22:48:01 nextcloud sshd\[13589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142 user=root |
2020-09-06 04:49:27 |
128.199.204.26 | attackspambots | 2020-09-05T21:43:36.442208snf-827550 sshd[2103]: Failed password for invalid user cron from 128.199.204.26 port 50448 ssh2 2020-09-05T21:51:11.849855snf-827550 sshd[2138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.26 user=root 2020-09-05T21:51:13.703555snf-827550 sshd[2138]: Failed password for root from 128.199.204.26 port 57048 ssh2 ... |
2020-09-06 05:15:24 |
101.71.51.192 | attackspam | Sep 5 20:53:39 onepixel sshd[2000376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192 Sep 5 20:53:39 onepixel sshd[2000376]: Invalid user jennie from 101.71.51.192 port 60854 Sep 5 20:53:41 onepixel sshd[2000376]: Failed password for invalid user jennie from 101.71.51.192 port 60854 ssh2 Sep 5 20:56:26 onepixel sshd[2000818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192 user=root Sep 5 20:56:28 onepixel sshd[2000818]: Failed password for root from 101.71.51.192 port 52376 ssh2 |
2020-09-06 05:10:27 |
162.214.111.167 | attackbots | " " |
2020-09-06 05:22:34 |
218.92.0.251 | attackbots | Sep 5 22:54:03 prod4 sshd\[27473\]: Failed password for root from 218.92.0.251 port 55050 ssh2 Sep 5 22:54:06 prod4 sshd\[27473\]: Failed password for root from 218.92.0.251 port 55050 ssh2 Sep 5 22:54:09 prod4 sshd\[27473\]: Failed password for root from 218.92.0.251 port 55050 ssh2 ... |
2020-09-06 04:56:16 |
45.143.223.106 | attackbotsspam | [2020-09-05 17:13:14] NOTICE[1194][C-00000f3f] chan_sip.c: Call from '' (45.143.223.106:63929) to extension '00441904911024' rejected because extension not found in context 'public'. [2020-09-05 17:13:14] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T17:13:14.866-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441904911024",SessionID="0x7f2ddc0f4e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.223.106/63929",ACLName="no_extension_match" [2020-09-05 17:13:47] NOTICE[1194][C-00000f41] chan_sip.c: Call from '' (45.143.223.106:49698) to extension '011441904911024' rejected because extension not found in context 'public'. [2020-09-05 17:13:47] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T17:13:47.677-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441904911024",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP ... |
2020-09-06 05:22:48 |