City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.142.14.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.142.14.46. IN A
;; AUTHORITY SECTION:
. 177 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031800 1800 900 604800 86400
;; Query time: 460 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 19:19:04 CST 2022
;; MSG SIZE rcvd: 106
Host 46.14.142.116.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 46.14.142.116.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 36.236.141.156 | attackbots | Honeypot attack, port: 23, PTR: 36-236-141-156.dynamic-ip.hinet.net. |
2019-09-26 03:41:11 |
| 144.217.164.70 | attackbotsspam | Sep 25 09:02:10 aiointranet sshd\[522\]: Invalid user csgoserver from 144.217.164.70 Sep 25 09:02:10 aiointranet sshd\[522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.ip-144-217-164.net Sep 25 09:02:12 aiointranet sshd\[522\]: Failed password for invalid user csgoserver from 144.217.164.70 port 47686 ssh2 Sep 25 09:06:51 aiointranet sshd\[943\]: Invalid user frappe from 144.217.164.70 Sep 25 09:06:51 aiointranet sshd\[943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.ip-144-217-164.net |
2019-09-26 03:23:34 |
| 186.212.107.224 | attack | Honeypot attack, port: 23, PTR: 186.212.107.224.static.host.gvt.net.br. |
2019-09-26 03:33:10 |
| 73.90.129.233 | attack | $f2bV_matches |
2019-09-26 03:19:43 |
| 180.76.196.179 | attackspambots | Sep 25 20:49:53 server sshd\[22236\]: Invalid user mitchell from 180.76.196.179 port 39972 Sep 25 20:49:53 server sshd\[22236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.196.179 Sep 25 20:49:54 server sshd\[22236\]: Failed password for invalid user mitchell from 180.76.196.179 port 39972 ssh2 Sep 25 20:54:35 server sshd\[22083\]: Invalid user pio from 180.76.196.179 port 50494 Sep 25 20:54:35 server sshd\[22083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.196.179 |
2019-09-26 03:29:42 |
| 50.250.231.41 | attack | 2019-09-25T12:47:12.7541541495-001 sshd\[4390\]: Failed password for invalid user jira from 50.250.231.41 port 49735 ssh2 2019-09-25T13:00:19.2950621495-001 sshd\[5175\]: Invalid user antonio from 50.250.231.41 port 54658 2019-09-25T13:00:19.2985621495-001 sshd\[5175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-250-231-41-static.hfc.comcastbusiness.net 2019-09-25T13:00:21.8207281495-001 sshd\[5175\]: Failed password for invalid user antonio from 50.250.231.41 port 54658 ssh2 2019-09-25T13:04:37.9220491495-001 sshd\[5492\]: Invalid user sunday from 50.250.231.41 port 46887 2019-09-25T13:04:37.9301061495-001 sshd\[5492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-250-231-41-static.hfc.comcastbusiness.net ... |
2019-09-26 03:23:19 |
| 51.68.139.102 | attackbots | Sep 25 08:56:32 vtv3 sshd\[25950\]: Invalid user hky from 51.68.139.102 port 58248 Sep 25 08:56:32 vtv3 sshd\[25950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.139.102 Sep 25 08:56:34 vtv3 sshd\[25950\]: Failed password for invalid user hky from 51.68.139.102 port 58248 ssh2 Sep 25 09:00:21 vtv3 sshd\[28241\]: Invalid user transfer from 51.68.139.102 port 42530 Sep 25 09:00:21 vtv3 sshd\[28241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.139.102 Sep 25 09:11:52 vtv3 sshd\[1647\]: Invalid user nb from 51.68.139.102 port 51830 Sep 25 09:11:52 vtv3 sshd\[1647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.139.102 Sep 25 09:11:54 vtv3 sshd\[1647\]: Failed password for invalid user nb from 51.68.139.102 port 51830 ssh2 Sep 25 09:16:00 vtv3 sshd\[3845\]: Invalid user system from 51.68.139.102 port 36108 Sep 25 09:16:00 vtv3 sshd\[3845\]: pam_unix\(sshd:a |
2019-09-26 03:31:16 |
| 121.62.107.64 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/121.62.107.64/ CN - 1H : (1629) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 121.62.107.64 CIDR : 121.60.0.0/14 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 WYKRYTE ATAKI Z ASN4134 : 1H - 20 3H - 65 6H - 114 12H - 227 24H - 639 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-09-26 03:22:56 |
| 210.56.8.83 | attack | Honeypot attack, port: 445, PTR: tserver.comsats.net.pk. |
2019-09-26 03:37:33 |
| 41.43.73.129 | attackbots | Honeypot attack, port: 23, PTR: host-41.43.73.129.tedata.net. |
2019-09-26 03:05:59 |
| 14.157.117.158 | attackspam | 23/tcp [2019-09-25]1pkt |
2019-09-26 03:13:18 |
| 106.53.69.173 | attackbots | 2019-09-25T19:26:06.748911abusebot-4.cloudsearch.cf sshd\[8990\]: Invalid user baldwin from 106.53.69.173 port 52534 |
2019-09-26 03:34:47 |
| 148.70.204.218 | attackspambots | Sep 25 21:25:24 OPSO sshd\[6247\]: Invalid user nefertiti from 148.70.204.218 port 47284 Sep 25 21:25:24 OPSO sshd\[6247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.204.218 Sep 25 21:25:26 OPSO sshd\[6247\]: Failed password for invalid user nefertiti from 148.70.204.218 port 47284 ssh2 Sep 25 21:30:36 OPSO sshd\[7286\]: Invalid user nq from 148.70.204.218 port 57104 Sep 25 21:30:36 OPSO sshd\[7286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.204.218 |
2019-09-26 03:39:50 |
| 171.244.10.50 | attackspambots | SSH bruteforce (Triggered fail2ban) |
2019-09-26 03:14:48 |
| 94.6.219.175 | attackspam | Sep 25 14:11:46 localhost sshd\[31957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.6.219.175 user=backup Sep 25 14:11:47 localhost sshd\[31957\]: Failed password for backup from 94.6.219.175 port 60797 ssh2 Sep 25 14:15:34 localhost sshd\[580\]: Invalid user odoo from 94.6.219.175 port 37446 Sep 25 14:15:34 localhost sshd\[580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.6.219.175 |
2019-09-26 03:44:13 |