City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.243.8.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.243.8.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 17:15:04 CST 2025
;; MSG SIZE rcvd: 105
21.8.243.104.in-addr.arpa domain name pointer 104-243-8-21.tisd.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.8.243.104.in-addr.arpa name = 104-243-8-21.tisd.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
49.88.112.114 | attackbotsspam | Sep 30 21:19:01 web1 sshd\[16979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Sep 30 21:19:02 web1 sshd\[16979\]: Failed password for root from 49.88.112.114 port 56341 ssh2 Sep 30 21:20:04 web1 sshd\[17067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Sep 30 21:20:06 web1 sshd\[17067\]: Failed password for root from 49.88.112.114 port 64875 ssh2 Sep 30 21:21:04 web1 sshd\[17148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root |
2019-10-01 15:23:43 |
80.22.196.98 | attackbots | $f2bV_matches |
2019-10-01 15:06:24 |
82.152.171.189 | attack | Oct 1 09:13:09 srv206 sshd[5856]: Invalid user postgres from 82.152.171.189 ... |
2019-10-01 15:17:03 |
61.219.11.153 | attack | firewall-block, port(s): 53/tcp |
2019-10-01 15:24:06 |
91.188.189.223 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/91.188.189.223/ RU - 1H : (424) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : RU NAME ASN : ASN8905 IP : 91.188.189.223 CIDR : 91.188.189.0/24 PREFIX COUNT : 37 UNIQUE IP COUNT : 65536 WYKRYTE ATAKI Z ASN8905 : 1H - 1 3H - 2 6H - 2 12H - 2 24H - 2 DateTime : 2019-10-01 05:51:48 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-01 15:05:36 |
62.234.131.141 | attackbotsspam | Sep 30 20:36:36 hpm sshd\[17338\]: Invalid user mfg from 62.234.131.141 Sep 30 20:36:36 hpm sshd\[17338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.131.141 Sep 30 20:36:38 hpm sshd\[17338\]: Failed password for invalid user mfg from 62.234.131.141 port 49990 ssh2 Sep 30 20:41:10 hpm sshd\[17844\]: Invalid user gesuino from 62.234.131.141 Sep 30 20:41:10 hpm sshd\[17844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.131.141 |
2019-10-01 15:04:09 |
185.175.93.103 | attack | 10/01/2019-09:08:03.589396 185.175.93.103 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-01 15:11:17 |
200.199.6.204 | attackspambots | Oct 1 09:05:09 eventyay sshd[3065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.6.204 Oct 1 09:05:12 eventyay sshd[3065]: Failed password for invalid user portal_client from 200.199.6.204 port 44693 ssh2 Oct 1 09:10:25 eventyay sshd[3119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.6.204 ... |
2019-10-01 15:21:47 |
79.7.207.99 | attackbots | 2019-10-01T00:14:05.7529541495-001 sshd\[41477\]: Invalid user sup from 79.7.207.99 port 55698 2019-10-01T00:14:05.7622431495-001 sshd\[41477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host99-207-static.7-79-b.business.telecomitalia.it 2019-10-01T00:14:07.9564231495-001 sshd\[41477\]: Failed password for invalid user sup from 79.7.207.99 port 55698 ssh2 2019-10-01T00:18:01.0605091495-001 sshd\[41794\]: Invalid user 2569 from 79.7.207.99 port 52771 2019-10-01T00:18:01.0676401495-001 sshd\[41794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host99-207-static.7-79-b.business.telecomitalia.it 2019-10-01T00:18:02.5187201495-001 sshd\[41794\]: Failed password for invalid user 2569 from 79.7.207.99 port 52771 ssh2 ... |
2019-10-01 15:12:54 |
165.231.168.11 | attack | Unauthorized access detected from banned ip |
2019-10-01 15:38:23 |
36.75.140.36 | attackbotsspam | Lines containing failures of 36.75.140.36 Oct 1 05:38:29 www sshd[2385]: Invalid user vivianne from 36.75.140.36 port 31922 Oct 1 05:38:29 www sshd[2385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.75.140.36 Oct 1 05:38:31 www sshd[2385]: Failed password for invalid user vivianne from 36.75.140.36 port 31922 ssh2 Oct 1 05:38:31 www sshd[2385]: Received disconnect from 36.75.140.36 port 31922:11: Bye Bye [preauth] Oct 1 05:38:31 www sshd[2385]: Disconnected from invalid user vivianne 36.75.140.36 port 31922 [preauth] Oct 1 05:44:49 www sshd[3163]: Invalid user jm from 36.75.140.36 port 11241 Oct 1 05:44:49 www sshd[3163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.75.140.36 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=36.75.140.36 |
2019-10-01 15:39:52 |
106.13.48.241 | attackbotsspam | Sep 30 08:54:18 xb0 sshd[29143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241 user=r.r Sep 30 08:54:20 xb0 sshd[29143]: Failed password for r.r from 106.13.48.241 port 36024 ssh2 Sep 30 08:54:20 xb0 sshd[29143]: Received disconnect from 106.13.48.241: 11: Bye Bye [preauth] Sep 30 09:51:06 xb0 sshd[30193]: Failed password for invalid user plex from 106.13.48.241 port 40774 ssh2 Sep 30 09:51:06 xb0 sshd[30193]: Received disconnect from 106.13.48.241: 11: Bye Bye [preauth] Sep 30 09:56:20 xb0 sshd[31968]: Failed password for invalid user intranet from 106.13.48.241 port 49992 ssh2 Sep 30 09:56:20 xb0 sshd[31968]: Received disconnect from 106.13.48.241: 11: Bye Bye [preauth] Sep 30 10:01:30 xb0 sshd[32381]: Failed password for invalid user randy from 106.13.48.241 port 59208 ssh2 Sep 30 10:01:31 xb0 sshd[32381]: Received disconnect from 106.13.48.241: 11: Bye Bye [preauth] Sep 30 10:06:52 xb0 sshd[2780]: Failed passw........ ------------------------------- |
2019-10-01 15:15:34 |
51.75.202.218 | attackbotsspam | Sep 30 21:17:04 auw2 sshd\[1481\]: Invalid user trendimsa1.0 from 51.75.202.218 Sep 30 21:17:04 auw2 sshd\[1481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-51-75-202.eu Sep 30 21:17:06 auw2 sshd\[1481\]: Failed password for invalid user trendimsa1.0 from 51.75.202.218 port 40042 ssh2 Sep 30 21:21:01 auw2 sshd\[1830\]: Invalid user sansforensics from 51.75.202.218 Sep 30 21:21:01 auw2 sshd\[1830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-51-75-202.eu |
2019-10-01 15:29:49 |
218.95.182.148 | attackspambots | Sep 30 21:18:04 tdfoods sshd\[13099\]: Invalid user fax from 218.95.182.148 Sep 30 21:18:04 tdfoods sshd\[13099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.95.182.148 Sep 30 21:18:05 tdfoods sshd\[13099\]: Failed password for invalid user fax from 218.95.182.148 port 55964 ssh2 Sep 30 21:23:17 tdfoods sshd\[13529\]: Invalid user ed from 218.95.182.148 Sep 30 21:23:17 tdfoods sshd\[13529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.95.182.148 |
2019-10-01 15:28:02 |
129.154.67.65 | attackspam | Sep 30 21:28:35 sachi sshd\[22015\]: Invalid user brett from 129.154.67.65 Sep 30 21:28:35 sachi sshd\[22015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com Sep 30 21:28:37 sachi sshd\[22015\]: Failed password for invalid user brett from 129.154.67.65 port 21086 ssh2 Sep 30 21:33:36 sachi sshd\[22424\]: Invalid user corpmail from 129.154.67.65 Sep 30 21:33:36 sachi sshd\[22424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com |
2019-10-01 15:43:33 |