City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.70.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.70.74. IN A
;; AUTHORITY SECTION:
. 335 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:18:13 CST 2022
;; MSG SIZE rcvd: 105
Host 74.70.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.70.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
222.186.31.127 | attackspam | Feb 13 06:23:05 vps691689 sshd[24981]: Failed password for root from 222.186.31.127 port 20309 ssh2 Feb 13 06:27:40 vps691689 sshd[25285]: Failed password for root from 222.186.31.127 port 32013 ssh2 ... |
2020-02-13 13:36:52 |
101.200.172.191 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-13 13:33:06 |
124.121.99.236 | attack | Automatic report - Port Scan Attack |
2020-02-13 13:17:10 |
45.94.174.30 | attackspam | Automatic report - Port Scan Attack |
2020-02-13 13:53:21 |
125.64.94.211 | attackspam | firewall-block, port(s): 27017/tcp |
2020-02-13 13:23:16 |
167.71.186.128 | attackspambots | "SSH brute force auth login attempt." |
2020-02-13 13:34:49 |
164.52.12.210 | attack | Feb 13 05:55:19 dedicated sshd[30323]: Invalid user reports from 164.52.12.210 port 39544 |
2020-02-13 13:10:58 |
182.253.105.93 | attackbotsspam | Feb 13 05:52:24 markkoudstaal sshd[5081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93 Feb 13 05:52:27 markkoudstaal sshd[5081]: Failed password for invalid user git from 182.253.105.93 port 55872 ssh2 Feb 13 05:55:14 markkoudstaal sshd[5583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.105.93 |
2020-02-13 13:18:42 |
51.75.19.45 | attackspambots | Feb 12 19:18:52 hpm sshd\[32079\]: Invalid user newtech from 51.75.19.45 Feb 12 19:18:52 hpm sshd\[32079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-75-19.eu Feb 12 19:18:53 hpm sshd\[32079\]: Failed password for invalid user newtech from 51.75.19.45 port 47732 ssh2 Feb 12 19:21:33 hpm sshd\[32526\]: Invalid user 1q2w3e4r from 51.75.19.45 Feb 12 19:21:33 hpm sshd\[32526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-75-19.eu |
2020-02-13 13:32:43 |
121.162.60.159 | attackspambots | Feb 13 05:52:49 sd-53420 sshd\[3944\]: Invalid user oracle from 121.162.60.159 Feb 13 05:52:49 sd-53420 sshd\[3944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 Feb 13 05:52:50 sd-53420 sshd\[3944\]: Failed password for invalid user oracle from 121.162.60.159 port 57182 ssh2 Feb 13 05:55:22 sd-53420 sshd\[4260\]: User root from 121.162.60.159 not allowed because none of user's groups are listed in AllowGroups Feb 13 05:55:22 sd-53420 sshd\[4260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 user=root ... |
2020-02-13 13:09:42 |
220.164.193.238 | attackspam | Brute force attempt |
2020-02-13 13:08:34 |
222.186.173.215 | attackspam | Feb 13 00:39:25 plusreed sshd[17300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Feb 13 00:39:27 plusreed sshd[17300]: Failed password for root from 222.186.173.215 port 30404 ssh2 Feb 13 00:39:32 plusreed sshd[17300]: Failed password for root from 222.186.173.215 port 30404 ssh2 Feb 13 00:39:25 plusreed sshd[17300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Feb 13 00:39:27 plusreed sshd[17300]: Failed password for root from 222.186.173.215 port 30404 ssh2 Feb 13 00:39:32 plusreed sshd[17300]: Failed password for root from 222.186.173.215 port 30404 ssh2 Feb 13 00:39:25 plusreed sshd[17300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Feb 13 00:39:27 plusreed sshd[17300]: Failed password for root from 222.186.173.215 port 30404 ssh2 Feb 13 00:39:32 plusreed sshd[17300]: Failed password for root fr |
2020-02-13 13:43:14 |
3.82.211.52 | attack | Automatic report - SSH Brute-Force Attack |
2020-02-13 13:19:54 |
49.235.69.80 | attackbotsspam | Feb 13 05:55:05 MK-Soft-VM3 sshd[27822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.69.80 Feb 13 05:55:07 MK-Soft-VM3 sshd[27822]: Failed password for invalid user plsql from 49.235.69.80 port 48924 ssh2 ... |
2020-02-13 13:24:59 |
103.231.94.151 | attackspam | Port probing on unauthorized port 22 |
2020-02-13 13:13:26 |