City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.44.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.22.44.242. IN A
;; AUTHORITY SECTION:
. 379 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 05:27:14 CST 2022
;; MSG SIZE rcvd: 106
Host 242.44.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.44.22.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
159.203.72.14 | attack | Invalid user tmpu from 159.203.72.14 port 50924 |
2020-06-12 01:20:52 |
40.65.160.21 | attackspam | Brute force 65 attempts |
2020-06-12 01:16:34 |
140.143.145.129 | attackbotsspam | Jun 11 19:57:35 pkdns2 sshd\[38730\]: Invalid user recover from 140.143.145.129Jun 11 19:57:38 pkdns2 sshd\[38730\]: Failed password for invalid user recover from 140.143.145.129 port 33732 ssh2Jun 11 19:59:21 pkdns2 sshd\[38795\]: Failed password for root from 140.143.145.129 port 52884 ssh2Jun 11 20:01:01 pkdns2 sshd\[38898\]: Failed password for root from 140.143.145.129 port 43790 ssh2Jun 11 20:02:45 pkdns2 sshd\[38978\]: Invalid user e from 140.143.145.129Jun 11 20:02:47 pkdns2 sshd\[38978\]: Failed password for invalid user e from 140.143.145.129 port 34708 ssh2 ... |
2020-06-12 01:21:28 |
47.100.112.214 | attackspam | 47.100.112.214 - - [11/Jun/2020:19:16:54 +0200] "GET /test/wp-login.php HTTP/1.1" 301 252 "http://[hidden]/test/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-12 01:27:10 |
222.186.175.154 | attackspambots | Jun 11 19:15:38 legacy sshd[28384]: Failed password for root from 222.186.175.154 port 27954 ssh2 Jun 11 19:15:54 legacy sshd[28384]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 27954 ssh2 [preauth] Jun 11 19:16:06 legacy sshd[28404]: Failed password for root from 222.186.175.154 port 9396 ssh2 ... |
2020-06-12 01:17:59 |
218.92.0.208 | attackspam | Jun 11 18:24:18 eventyay sshd[23475]: Failed password for root from 218.92.0.208 port 58094 ssh2 Jun 11 18:27:25 eventyay sshd[23556]: Failed password for root from 218.92.0.208 port 26940 ssh2 Jun 11 18:27:28 eventyay sshd[23556]: Failed password for root from 218.92.0.208 port 26940 ssh2 ... |
2020-06-12 01:03:03 |
31.41.135.120 | attackspam | Jun 11 12:11:29 *** sshd[19480]: Invalid user admin from 31.41.135.120 |
2020-06-12 01:17:30 |
180.76.240.225 | attack | Jun 11 17:46:02 vps639187 sshd\[25420\]: Invalid user gaoxia from 180.76.240.225 port 50306 Jun 11 17:46:02 vps639187 sshd\[25420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.240.225 Jun 11 17:46:04 vps639187 sshd\[25420\]: Failed password for invalid user gaoxia from 180.76.240.225 port 50306 ssh2 ... |
2020-06-12 00:49:21 |
139.199.119.76 | attack | Jun 11 14:44:29 vps639187 sshd\[23338\]: Invalid user admin from 139.199.119.76 port 49448 Jun 11 14:44:29 vps639187 sshd\[23338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.119.76 Jun 11 14:44:31 vps639187 sshd\[23338\]: Failed password for invalid user admin from 139.199.119.76 port 49448 ssh2 ... |
2020-06-12 01:21:45 |
78.128.113.42 | attackspambots | Jun 11 19:05:03 debian-2gb-nbg1-2 kernel: \[14153828.376057\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.128.113.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=61724 PROTO=TCP SPT=52445 DPT=6409 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-12 01:24:31 |
201.94.197.252 | attackspambots | Jun 11 15:50:38 meumeu sshd[252069]: Invalid user qdyh from 201.94.197.252 port 38486 Jun 11 15:50:38 meumeu sshd[252069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.94.197.252 Jun 11 15:50:38 meumeu sshd[252069]: Invalid user qdyh from 201.94.197.252 port 38486 Jun 11 15:50:40 meumeu sshd[252069]: Failed password for invalid user qdyh from 201.94.197.252 port 38486 ssh2 Jun 11 15:54:57 meumeu sshd[252328]: Invalid user xiao from 201.94.197.252 port 42194 Jun 11 15:54:57 meumeu sshd[252328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.94.197.252 Jun 11 15:54:57 meumeu sshd[252328]: Invalid user xiao from 201.94.197.252 port 42194 Jun 11 15:54:58 meumeu sshd[252328]: Failed password for invalid user xiao from 201.94.197.252 port 42194 ssh2 Jun 11 15:59:05 meumeu sshd[252547]: Invalid user deploy from 201.94.197.252 port 45900 ... |
2020-06-12 00:59:00 |
49.32.31.137 | attack | 1591877511 - 06/11/2020 14:11:51 Host: 49.32.31.137/49.32.31.137 Port: 445 TCP Blocked |
2020-06-12 01:26:49 |
157.44.45.178 | attackspambots | 20/6/11@08:11:57: FAIL: Alarm-Network address from=157.44.45.178 ... |
2020-06-12 01:06:39 |
218.78.101.32 | attack | 2020-06-11 14:12:14,899 fail2ban.actions: WARNING [ssh] Ban 218.78.101.32 |
2020-06-12 01:11:00 |
121.121.158.251 | attack | Automatic report - Port Scan Attack |
2020-06-12 01:22:20 |