City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.68.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.68.66. IN A
;; AUTHORITY SECTION:
. 316 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:20:44 CST 2022
;; MSG SIZE rcvd: 105
Host 66.68.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.68.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
47.244.190.211 | attack | [09/Sep/2020:20:27:04 -0400] "GET / HTTP/1.1" "Go-http-client/1.1" |
2020-09-10 21:02:35 |
120.132.13.131 | attack | Sep 10 08:45:10 ns382633 sshd\[3157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.131 user=root Sep 10 08:45:11 ns382633 sshd\[3157\]: Failed password for root from 120.132.13.131 port 49245 ssh2 Sep 10 08:51:01 ns382633 sshd\[4387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.131 user=root Sep 10 08:51:03 ns382633 sshd\[4387\]: Failed password for root from 120.132.13.131 port 45776 ssh2 Sep 10 08:52:52 ns382633 sshd\[4505\]: Invalid user admin from 120.132.13.131 port 55223 Sep 10 08:52:52 ns382633 sshd\[4505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.131 |
2020-09-10 20:35:23 |
35.200.180.182 | attackbotsspam | 35.200.180.182 - - [10/Sep/2020:10:33:56 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.200.180.182 - - [10/Sep/2020:10:33:59 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.200.180.182 - - [10/Sep/2020:10:34:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-10 21:01:33 |
51.75.52.118 | attackspambots | Sep 10 13:10:34 marvibiene sshd[27085]: Failed password for root from 51.75.52.118 port 41870 ssh2 Sep 10 13:10:37 marvibiene sshd[27085]: Failed password for root from 51.75.52.118 port 41870 ssh2 |
2020-09-10 20:28:57 |
47.100.203.120 | attackbots | Sep 9 18:58:31 gospond sshd[30860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.100.203.120 Sep 9 18:58:31 gospond sshd[30860]: Invalid user mgithinji from 47.100.203.120 port 33432 Sep 9 18:58:33 gospond sshd[30860]: Failed password for invalid user mgithinji from 47.100.203.120 port 33432 ssh2 ... |
2020-09-10 21:13:19 |
51.75.126.115 | attack | Sep 10 10:53:33 root sshd[12580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.115 ... |
2020-09-10 20:47:14 |
175.198.80.24 | attackbots | Sep 10 11:29:31 h2779839 sshd[26315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.198.80.24 user=root Sep 10 11:29:33 h2779839 sshd[26315]: Failed password for root from 175.198.80.24 port 42078 ssh2 Sep 10 11:31:39 h2779839 sshd[26368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.198.80.24 user=root Sep 10 11:31:41 h2779839 sshd[26368]: Failed password for root from 175.198.80.24 port 44014 ssh2 Sep 10 11:33:46 h2779839 sshd[26383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.198.80.24 user=root Sep 10 11:33:49 h2779839 sshd[26383]: Failed password for root from 175.198.80.24 port 45980 ssh2 Sep 10 11:35:53 h2779839 sshd[26452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.198.80.24 user=root Sep 10 11:35:54 h2779839 sshd[26452]: Failed password for root from 175.198.80.24 port 47938 ssh2 Sep ... |
2020-09-10 20:58:09 |
24.179.198.164 | attackbotsspam | Sep 9 12:57:47 aragorn sshd[16354]: Invalid user admin from 24.179.198.164 Sep 9 12:57:47 aragorn sshd[16356]: Invalid user admin from 24.179.198.164 Sep 9 12:57:48 aragorn sshd[16358]: Invalid user admin from 24.179.198.164 Sep 9 12:57:48 aragorn sshd[16360]: Invalid user admin from 24.179.198.164 ... |
2020-09-10 21:12:33 |
106.12.166.167 | attackbots | (sshd) Failed SSH login from 106.12.166.167 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 10 09:06:14 server5 sshd[13612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.166.167 user=root Sep 10 09:06:16 server5 sshd[13612]: Failed password for root from 106.12.166.167 port 28239 ssh2 Sep 10 09:08:13 server5 sshd[14652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.166.167 user=root Sep 10 09:08:15 server5 sshd[14652]: Failed password for root from 106.12.166.167 port 47445 ssh2 Sep 10 09:09:49 server5 sshd[15440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.166.167 user=root |
2020-09-10 21:14:50 |
5.196.225.45 | attack | Sep 10 08:24:23 firewall sshd[10289]: Invalid user training from 5.196.225.45 Sep 10 08:24:25 firewall sshd[10289]: Failed password for invalid user training from 5.196.225.45 port 34220 ssh2 Sep 10 08:28:02 firewall sshd[10372]: Invalid user brock from 5.196.225.45 ... |
2020-09-10 20:46:44 |
177.107.35.26 | attackbotsspam | 2020-09-10 08:11:02,544 fail2ban.actions: WARNING [ssh] Ban 177.107.35.26 |
2020-09-10 20:34:31 |
117.30.209.213 | attack | Sep 7 11:11:55 m1 sshd[9984]: Invalid user pi from 117.30.209.213 Sep 7 11:11:55 m1 sshd[9985]: Invalid user pi from 117.30.209.213 Sep 7 11:11:57 m1 sshd[9984]: Failed password for invalid user pi from 117.30.209.213 port 47584 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=117.30.209.213 |
2020-09-10 20:44:03 |
222.186.180.130 | attack | 2020-09-10T15:32:28.324369lavrinenko.info sshd[22204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root 2020-09-10T15:32:30.779613lavrinenko.info sshd[22204]: Failed password for root from 222.186.180.130 port 55738 ssh2 2020-09-10T15:32:28.324369lavrinenko.info sshd[22204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130 user=root 2020-09-10T15:32:30.779613lavrinenko.info sshd[22204]: Failed password for root from 222.186.180.130 port 55738 ssh2 2020-09-10T15:32:34.249689lavrinenko.info sshd[22204]: Failed password for root from 222.186.180.130 port 55738 ssh2 ... |
2020-09-10 20:33:37 |
112.85.42.237 | attack | 2020-09-10T06:47:27.732493yoshi.linuxbox.ninja sshd[192944]: Failed password for root from 112.85.42.237 port 60983 ssh2 2020-09-10T06:47:31.759069yoshi.linuxbox.ninja sshd[192944]: Failed password for root from 112.85.42.237 port 60983 ssh2 2020-09-10T06:47:35.153850yoshi.linuxbox.ninja sshd[192944]: Failed password for root from 112.85.42.237 port 60983 ssh2 ... |
2020-09-10 20:32:33 |
125.43.69.155 | attackspambots | 2020-09-10T10:05:33.999202lavrinenko.info sshd[14659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.43.69.155 2020-09-10T10:05:33.993253lavrinenko.info sshd[14659]: Invalid user ftpuser from 125.43.69.155 port 28830 2020-09-10T10:05:35.989985lavrinenko.info sshd[14659]: Failed password for invalid user ftpuser from 125.43.69.155 port 28830 ssh2 2020-09-10T10:08:34.069050lavrinenko.info sshd[14667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.43.69.155 user=root 2020-09-10T10:08:36.240117lavrinenko.info sshd[14667]: Failed password for root from 125.43.69.155 port 22282 ssh2 ... |
2020-09-10 21:08:01 |