City: Kansas City
Region: Missouri
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.34.121.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.34.121.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 22:03:14 CST 2025
;; MSG SIZE rcvd: 107
Host 142.121.34.107.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 142.121.34.107.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
47.17.177.110 | attackbots | Oct 11 20:31:31 hanapaa sshd\[1562\]: Invalid user Euro123 from 47.17.177.110 Oct 11 20:31:31 hanapaa sshd\[1562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f11b16e.dyn.optonline.net Oct 11 20:31:34 hanapaa sshd\[1562\]: Failed password for invalid user Euro123 from 47.17.177.110 port 44370 ssh2 Oct 11 20:37:19 hanapaa sshd\[2057\]: Invalid user Montblanc!23 from 47.17.177.110 Oct 11 20:37:19 hanapaa sshd\[2057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f11b16e.dyn.optonline.net |
2019-10-12 15:13:23 |
123.24.164.61 | attack | Chat Spam |
2019-10-12 14:34:27 |
62.234.206.12 | attackspambots | Oct 11 20:18:23 php1 sshd\[17103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 user=root Oct 11 20:18:24 php1 sshd\[17103\]: Failed password for root from 62.234.206.12 port 47942 ssh2 Oct 11 20:23:16 php1 sshd\[17499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 user=root Oct 11 20:23:18 php1 sshd\[17499\]: Failed password for root from 62.234.206.12 port 56208 ssh2 Oct 11 20:28:10 php1 sshd\[17877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 user=root |
2019-10-12 14:45:30 |
148.70.65.31 | attackbots | Oct 12 02:34:28 xtremcommunity sshd\[438356\]: Invalid user Secure2017 from 148.70.65.31 port 17325 Oct 12 02:34:28 xtremcommunity sshd\[438356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31 Oct 12 02:34:30 xtremcommunity sshd\[438356\]: Failed password for invalid user Secure2017 from 148.70.65.31 port 17325 ssh2 Oct 12 02:40:14 xtremcommunity sshd\[438598\]: Invalid user Remote2017 from 148.70.65.31 port 55727 Oct 12 02:40:14 xtremcommunity sshd\[438598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31 ... |
2019-10-12 14:43:44 |
79.187.192.249 | attackspambots | Oct 12 02:35:47 xtremcommunity sshd\[438401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.192.249 user=root Oct 12 02:35:48 xtremcommunity sshd\[438401\]: Failed password for root from 79.187.192.249 port 41694 ssh2 Oct 12 02:39:47 xtremcommunity sshd\[438553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.192.249 user=root Oct 12 02:39:49 xtremcommunity sshd\[438553\]: Failed password for root from 79.187.192.249 port 32894 ssh2 Oct 12 02:43:48 xtremcommunity sshd\[438678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.187.192.249 user=root ... |
2019-10-12 15:04:48 |
206.189.30.229 | attack | Oct 12 08:48:35 ns37 sshd[9613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.229 Oct 12 08:48:35 ns37 sshd[9613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.30.229 |
2019-10-12 15:11:07 |
5.188.210.190 | attack | 10/12/2019-02:03:37.626619 5.188.210.190 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-12 15:02:52 |
182.149.166.113 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/182.149.166.113/ CN - 1H : (506) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 182.149.166.113 CIDR : 182.149.160.0/19 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 WYKRYTE ATAKI Z ASN4134 : 1H - 14 3H - 23 6H - 50 12H - 98 24H - 221 DateTime : 2019-10-12 08:03:45 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-12 14:54:56 |
45.227.253.133 | attack | 2019-10-12 08:55:06 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.133\]: 535 Incorrect authentication data \(set_id=noreply@opso.it\) 2019-10-12 08:55:14 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.133\]: 535 Incorrect authentication data \(set_id=noreply\) 2019-10-12 08:55:35 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.133\]: 535 Incorrect authentication data 2019-10-12 08:55:52 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.133\]: 535 Incorrect authentication data 2019-10-12 08:56:01 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.133\]: 535 Incorrect authentication data |
2019-10-12 14:57:31 |
142.93.1.100 | attack | Oct 11 20:32:12 friendsofhawaii sshd\[32024\]: Invalid user Bed123 from 142.93.1.100 Oct 11 20:32:12 friendsofhawaii sshd\[32024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 Oct 11 20:32:14 friendsofhawaii sshd\[32024\]: Failed password for invalid user Bed123 from 142.93.1.100 port 50346 ssh2 Oct 11 20:36:22 friendsofhawaii sshd\[32360\]: Invalid user Sky123 from 142.93.1.100 Oct 11 20:36:22 friendsofhawaii sshd\[32360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 |
2019-10-12 15:02:06 |
114.242.34.8 | attackspambots | $f2bV_matches |
2019-10-12 14:37:35 |
77.247.110.234 | attackbotsspam | \[2019-10-12 02:50:56\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-12T02:50:56.313-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="12830901148122518001",SessionID="0x7fc3ad578188",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.234/51646",ACLName="no_extension_match" \[2019-10-12 02:51:25\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-12T02:51:25.762-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="59011801148943147005",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.234/49543",ACLName="no_extension_match" \[2019-10-12 02:51:45\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-12T02:51:45.111-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00113148134454005",SessionID="0x7fc3ad578188",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.234/57083", |
2019-10-12 15:13:06 |
58.37.148.154 | attackbots | (Oct 12) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=24219 TCP DPT=8080 WINDOW=34450 SYN (Oct 11) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=52628 TCP DPT=8080 WINDOW=34450 SYN (Oct 11) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=5481 TCP DPT=8080 WINDOW=35738 SYN (Oct 10) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=29452 TCP DPT=8080 WINDOW=16155 SYN (Oct 10) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=39639 TCP DPT=8080 WINDOW=34450 SYN (Oct 9) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=56514 TCP DPT=8080 WINDOW=16155 SYN (Oct 9) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=28494 TCP DPT=8080 WINDOW=35738 SYN (Oct 9) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=4182 TCP DPT=8080 WINDOW=16155 SYN (Oct 9) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=49433 TCP DPT=8080 WINDOW=35738 SYN (Oct 8) LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=6992 TCP DPT=8080 WINDOW=34450 SYN |
2019-10-12 15:01:36 |
51.68.192.106 | attackbots | Oct 11 20:32:35 php1 sshd\[18258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106 user=root Oct 11 20:32:36 php1 sshd\[18258\]: Failed password for root from 51.68.192.106 port 43964 ssh2 Oct 11 20:36:13 php1 sshd\[18548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106 user=root Oct 11 20:36:15 php1 sshd\[18548\]: Failed password for root from 51.68.192.106 port 34684 ssh2 Oct 11 20:39:48 php1 sshd\[18970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106 user=root |
2019-10-12 14:47:42 |
223.75.51.13 | attack | Oct 12 08:17:11 eventyay sshd[24672]: Failed password for root from 223.75.51.13 port 56508 ssh2 Oct 12 08:20:32 eventyay sshd[24729]: Failed password for root from 223.75.51.13 port 14677 ssh2 ... |
2019-10-12 14:40:27 |