City: Bakersfield
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.131.243.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.131.243.157. IN A
;; AUTHORITY SECTION:
. 577 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020020300 1800 900 604800 86400
;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 23:58:22 CST 2020
;; MSG SIZE rcvd: 119
157.243.131.107.in-addr.arpa domain name pointer 107-131-243-157.lightspeed.bkfdca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.243.131.107.in-addr.arpa name = 107-131-243-157.lightspeed.bkfdca.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
31.184.198.150 | attackbots | ZTE Router Exploit Scanner |
2020-03-31 18:00:22 |
112.164.155.89 | attackspambots | Mar 31 05:51:04 debian-2gb-nbg1-2 kernel: \[7885718.846149\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=112.164.155.89 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=35486 DF PROTO=TCP SPT=8862 DPT=81 WINDOW=14600 RES=0x00 SYN URGP=0 |
2020-03-31 18:12:48 |
164.132.47.139 | attackbots | SSH auth scanning - multiple failed logins |
2020-03-31 17:45:05 |
192.241.201.182 | attack | Mar 31 11:19:29 host01 sshd[7241]: Failed password for root from 192.241.201.182 port 48494 ssh2 Mar 31 11:25:24 host01 sshd[8257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.201.182 Mar 31 11:25:26 host01 sshd[8257]: Failed password for invalid user user from 192.241.201.182 port 35114 ssh2 ... |
2020-03-31 17:27:27 |
18.206.190.72 | attackbotsspam | Port scan on 3 port(s): 91 2200 5003 |
2020-03-31 17:57:49 |
140.206.186.10 | attackbotsspam | Mar 31 09:32:12 vlre-nyc-1 sshd\[1805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.206.186.10 user=root Mar 31 09:32:14 vlre-nyc-1 sshd\[1805\]: Failed password for root from 140.206.186.10 port 60326 ssh2 Mar 31 09:40:27 vlre-nyc-1 sshd\[2068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.206.186.10 user=lxd Mar 31 09:40:29 vlre-nyc-1 sshd\[2068\]: Failed password for lxd from 140.206.186.10 port 59010 ssh2 Mar 31 09:42:00 vlre-nyc-1 sshd\[2101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.206.186.10 user=root ... |
2020-03-31 17:52:52 |
42.123.99.67 | attackspam | (sshd) Failed SSH login from 42.123.99.67 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 12:13:22 srv sshd[8856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.99.67 user=root Mar 31 12:13:24 srv sshd[8856]: Failed password for root from 42.123.99.67 port 59638 ssh2 Mar 31 12:14:33 srv sshd[8911]: Invalid user jboss from 42.123.99.67 port 37074 Mar 31 12:14:35 srv sshd[8911]: Failed password for invalid user jboss from 42.123.99.67 port 37074 ssh2 Mar 31 12:15:41 srv sshd[8975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.123.99.67 user=root |
2020-03-31 18:09:12 |
192.241.238.20 | attack | US_DigitalOcean,_<177>1585631420 [1:2402000:5497] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]: |
2020-03-31 17:49:25 |
49.235.92.215 | attack | 2020-03-31T05:19:12.494459shield sshd\[16489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.215 user=root 2020-03-31T05:19:14.074318shield sshd\[16489\]: Failed password for root from 49.235.92.215 port 38194 ssh2 2020-03-31T05:23:28.195296shield sshd\[17412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.215 user=root 2020-03-31T05:23:30.251974shield sshd\[17412\]: Failed password for root from 49.235.92.215 port 60642 ssh2 2020-03-31T05:27:35.217341shield sshd\[18179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.215 user=root |
2020-03-31 17:31:51 |
111.229.121.142 | attack | Mar 31 09:35:57 ewelt sshd[15205]: Invalid user chenxx from 111.229.121.142 port 49958 Mar 31 09:35:57 ewelt sshd[15205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.121.142 Mar 31 09:35:57 ewelt sshd[15205]: Invalid user chenxx from 111.229.121.142 port 49958 Mar 31 09:35:59 ewelt sshd[15205]: Failed password for invalid user chenxx from 111.229.121.142 port 49958 ssh2 ... |
2020-03-31 17:27:58 |
42.101.38.160 | attackbotsspam | Invalid user yft from 42.101.38.160 port 44700 |
2020-03-31 18:00:07 |
91.134.248.211 | attackbots | Unauthorized connection attempt detected, IP banned. |
2020-03-31 18:01:39 |
51.161.8.70 | attackspambots | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-03-31 17:47:47 |
193.112.99.5 | attack | (sshd) Failed SSH login from 193.112.99.5 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 05:35:25 andromeda sshd[4969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.99.5 user=root Mar 31 05:35:27 andromeda sshd[4969]: Failed password for root from 193.112.99.5 port 50448 ssh2 Mar 31 05:59:36 andromeda sshd[5903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.99.5 user=root |
2020-03-31 17:54:25 |
94.191.25.32 | attack | 03/31/2020-03:58:09.911748 94.191.25.32 Protocol: 6 ET SCAN Potential SSH Scan |
2020-03-31 17:44:37 |