City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.215.188.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.215.188.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:09:19 CST 2025
;; MSG SIZE rcvd: 107
42.188.215.108.in-addr.arpa domain name pointer 108-215-188-42.lightspeed.irvnca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.188.215.108.in-addr.arpa name = 108-215-188-42.lightspeed.irvnca.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.98.26.162 | attack | Sep 6 13:39:56 debian sshd[22785]: Unable to negotiate with 218.98.26.162 port 18279: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Sep 6 16:24:35 debian sshd[30024]: Unable to negotiate with 218.98.26.162 port 21549: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2019-09-07 04:35:43 |
| 91.244.73.228 | attack | 19/9/6@10:04:57: FAIL: IoT-Telnet address from=91.244.73.228 ... |
2019-09-07 04:13:43 |
| 218.98.26.182 | attackbotsspam | 2019-09-06T20:46:09.131606abusebot-3.cloudsearch.cf sshd\[29133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.182 user=root |
2019-09-07 04:57:52 |
| 179.43.149.11 | attackbots | scan r |
2019-09-07 04:58:26 |
| 45.87.88.25 | attackspambots | SMB Server BruteForce Attack |
2019-09-07 04:14:08 |
| 93.87.126.239 | attackspam | Unauthorized connection attempt from IP address 93.87.126.239 on Port 445(SMB) |
2019-09-07 04:56:21 |
| 190.103.109.1 | attackspam | Unauthorized connection attempt from IP address 190.103.109.1 on Port 445(SMB) |
2019-09-07 04:48:24 |
| 88.99.143.25 | attack | [ssh] SSH attack |
2019-09-07 04:18:49 |
| 172.229.223.194 | attack | Fri 06 09:24:24 51080/tcp Fri 06 09:24:24 51080/tcp Fri 06 09:24:24 51080/tcp Fri 06 09:25:07 51114/tcp Fri 06 09:25:07 51114/tcp Fri 06 09:25:07 51114/tcp |
2019-09-07 04:49:20 |
| 218.98.40.137 | attackspambots | Sep 6 20:26:18 localhost sshd\[122445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.137 user=root Sep 6 20:26:20 localhost sshd\[122445\]: Failed password for root from 218.98.40.137 port 56150 ssh2 Sep 6 20:26:22 localhost sshd\[122445\]: Failed password for root from 218.98.40.137 port 56150 ssh2 Sep 6 20:26:24 localhost sshd\[122445\]: Failed password for root from 218.98.40.137 port 56150 ssh2 Sep 6 20:26:26 localhost sshd\[122451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.137 user=root ... |
2019-09-07 04:48:50 |
| 168.227.91.169 | attackspambots | Sep 6 09:13:55 auw2 sshd\[28418\]: Invalid user factorio from 168.227.91.169 Sep 6 09:13:55 auw2 sshd\[28418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.227.91.169 Sep 6 09:13:57 auw2 sshd\[28418\]: Failed password for invalid user factorio from 168.227.91.169 port 48626 ssh2 Sep 6 09:18:51 auw2 sshd\[28834\]: Invalid user steam from 168.227.91.169 Sep 6 09:18:51 auw2 sshd\[28834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.227.91.169 |
2019-09-07 04:28:22 |
| 181.30.27.11 | attackbots | Sep 6 22:19:01 ubuntu-2gb-nbg1-dc3-1 sshd[26523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.27.11 Sep 6 22:19:03 ubuntu-2gb-nbg1-dc3-1 sshd[26523]: Failed password for invalid user test7 from 181.30.27.11 port 37180 ssh2 ... |
2019-09-07 04:44:12 |
| 203.129.219.198 | attackbots | Sep 6 19:11:48 saschabauer sshd[8304]: Failed password for root from 203.129.219.198 port 55774 ssh2 |
2019-09-07 04:55:09 |
| 124.156.168.194 | attackbotsspam | Sep 6 15:57:09 xtremcommunity sshd\[27915\]: Invalid user ts from 124.156.168.194 port 54898 Sep 6 15:57:09 xtremcommunity sshd\[27915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.168.194 Sep 6 15:57:11 xtremcommunity sshd\[27915\]: Failed password for invalid user ts from 124.156.168.194 port 54898 ssh2 Sep 6 16:02:20 xtremcommunity sshd\[28063\]: Invalid user admin from 124.156.168.194 port 42150 Sep 6 16:02:20 xtremcommunity sshd\[28063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.168.194 ... |
2019-09-07 04:20:43 |
| 195.154.38.177 | attackbots | Sep 6 20:13:32 hcbbdb sshd\[28260\]: Invalid user asteriskuser from 195.154.38.177 Sep 6 20:13:32 hcbbdb sshd\[28260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177 Sep 6 20:13:33 hcbbdb sshd\[28260\]: Failed password for invalid user asteriskuser from 195.154.38.177 port 33220 ssh2 Sep 6 20:17:20 hcbbdb sshd\[28668\]: Invalid user testuser from 195.154.38.177 Sep 6 20:17:20 hcbbdb sshd\[28668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177 |
2019-09-07 04:17:29 |