City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.74.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.74.163. IN A
;; AUTHORITY SECTION:
. 113 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:52:59 CST 2022
;; MSG SIZE rcvd: 106
Host 163.74.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 163.74.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
202.162.217.173 | attack | Unauthorized connection attempt from IP address 202.162.217.173 on Port 445(SMB) |
2019-09-04 00:41:43 |
185.101.33.136 | attackspambots | Masscan Port Scanning Tool Detection |
2019-09-04 01:06:36 |
103.80.210.80 | attackspambots | Unauthorized connection attempt from IP address 103.80.210.80 on Port 445(SMB) |
2019-09-04 01:42:32 |
104.139.5.180 | attackbots | Sep 3 18:37:49 vps691689 sshd[21946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.139.5.180 Sep 3 18:37:52 vps691689 sshd[21946]: Failed password for invalid user ria from 104.139.5.180 port 45510 ssh2 Sep 3 18:42:36 vps691689 sshd[22077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.139.5.180 ... |
2019-09-04 00:46:21 |
123.207.86.68 | attack | Sep 3 13:30:45 v22019058497090703 sshd[13588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.86.68 Sep 3 13:30:47 v22019058497090703 sshd[13588]: Failed password for invalid user lk from 123.207.86.68 port 48624 ssh2 Sep 3 13:35:28 v22019058497090703 sshd[13910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.86.68 ... |
2019-09-04 01:40:45 |
138.68.220.156 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-09-04 01:34:17 |
144.217.84.164 | attackbotsspam | Sep 3 01:36:49 eddieflores sshd\[28000\]: Invalid user webuser from 144.217.84.164 Sep 3 01:36:49 eddieflores sshd\[28000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-144-217-84.net Sep 3 01:36:52 eddieflores sshd\[28000\]: Failed password for invalid user webuser from 144.217.84.164 port 45532 ssh2 Sep 3 01:40:46 eddieflores sshd\[28375\]: Invalid user mcserver from 144.217.84.164 Sep 3 01:40:46 eddieflores sshd\[28375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-144-217-84.net |
2019-09-04 00:45:10 |
108.222.68.232 | attackbotsspam | Sep 3 14:36:46 MK-Soft-VM5 sshd\[12537\]: Invalid user 123 from 108.222.68.232 port 42428 Sep 3 14:36:46 MK-Soft-VM5 sshd\[12537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.222.68.232 Sep 3 14:36:48 MK-Soft-VM5 sshd\[12537\]: Failed password for invalid user 123 from 108.222.68.232 port 42428 ssh2 ... |
2019-09-04 01:10:40 |
188.19.11.200 | attack | Unauthorized connection attempt from IP address 188.19.11.200 on Port 445(SMB) |
2019-09-04 01:19:23 |
36.79.250.74 | attackbotsspam | Unauthorized connection attempt from IP address 36.79.250.74 on Port 445(SMB) |
2019-09-04 00:54:37 |
158.69.110.31 | attack | Sep 3 10:45:24 herz-der-gamer sshd[23923]: Invalid user iesse from 158.69.110.31 port 55752 Sep 3 10:45:24 herz-der-gamer sshd[23923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.110.31 Sep 3 10:45:24 herz-der-gamer sshd[23923]: Invalid user iesse from 158.69.110.31 port 55752 Sep 3 10:45:26 herz-der-gamer sshd[23923]: Failed password for invalid user iesse from 158.69.110.31 port 55752 ssh2 ... |
2019-09-04 01:16:26 |
114.143.75.118 | attack | Unauthorized connection attempt from IP address 114.143.75.118 on Port 445(SMB) |
2019-09-04 01:34:45 |
49.231.229.227 | attackspambots | Sep 3 20:18:05 taivassalofi sshd[121057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.229.227 Sep 3 20:18:07 taivassalofi sshd[121057]: Failed password for invalid user test from 49.231.229.227 port 55662 ssh2 ... |
2019-09-04 01:29:42 |
14.142.189.10 | attackbots | Unauthorized connection attempt from IP address 14.142.189.10 on Port 445(SMB) |
2019-09-04 01:15:52 |
157.230.226.108 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-09-04 01:18:23 |