City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.49.125.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.49.125.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 06:57:04 CST 2025
;; MSG SIZE rcvd: 106
42.125.49.116.in-addr.arpa domain name pointer n11649125042.netvigator.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.125.49.116.in-addr.arpa name = n11649125042.netvigator.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 79.124.62.66 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 3667 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-12 04:07:01 |
| 106.12.165.253 | attackbotsspam | SSH login attempts. |
2020-10-12 03:34:48 |
| 106.225.147.63 | attack | Lines containing failures of 106.225.147.63 Oct 10 08:58:15 newdogma sshd[16052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.147.63 user=r.r Oct 10 08:58:16 newdogma sshd[16052]: Failed password for r.r from 106.225.147.63 port 57391 ssh2 Oct 10 08:58:17 newdogma sshd[16052]: Received disconnect from 106.225.147.63 port 57391:11: Bye Bye [preauth] Oct 10 08:58:17 newdogma sshd[16052]: Disconnected from authenticating user r.r 106.225.147.63 port 57391 [preauth] Oct 10 09:10:53 newdogma sshd[16450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.147.63 user=r.r Oct 10 09:10:55 newdogma sshd[16450]: Failed password for r.r from 106.225.147.63 port 53846 ssh2 Oct 10 09:10:55 newdogma sshd[16450]: Received disconnect from 106.225.147.63 port 53846:11: Bye Bye [preauth] Oct 10 09:10:55 newdogma sshd[16450]: Disconnected from authenticating user r.r 106.225.147.63 port 53846........ ------------------------------ |
2020-10-12 03:44:31 |
| 34.94.155.56 | attackspambots | 34.94.155.56 - - [11/Oct/2020:17:07:06 +0200] "POST /xmlrpc.php HTTP/1.1" 403 15756 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 34.94.155.56 - - [11/Oct/2020:17:10:28 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-12 04:00:18 |
| 119.45.207.135 | attackbots | Oct 11 15:06:55 ws22vmsma01 sshd[233340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.207.135 Oct 11 15:06:58 ws22vmsma01 sshd[233340]: Failed password for invalid user ismail from 119.45.207.135 port 60600 ssh2 ... |
2020-10-12 03:59:31 |
| 112.85.42.200 | attackspambots | 2020-10-11T22:45:32.823449lavrinenko.info sshd[22623]: Failed password for root from 112.85.42.200 port 55282 ssh2 2020-10-11T22:45:38.259172lavrinenko.info sshd[22623]: Failed password for root from 112.85.42.200 port 55282 ssh2 2020-10-11T22:45:43.570807lavrinenko.info sshd[22623]: Failed password for root from 112.85.42.200 port 55282 ssh2 2020-10-11T22:45:48.218428lavrinenko.info sshd[22623]: Failed password for root from 112.85.42.200 port 55282 ssh2 2020-10-11T22:45:48.675262lavrinenko.info sshd[22623]: error: maximum authentication attempts exceeded for root from 112.85.42.200 port 55282 ssh2 [preauth] ... |
2020-10-12 03:48:47 |
| 58.214.11.123 | attackbotsspam |
|
2020-10-12 04:08:06 |
| 222.84.117.30 | attackspambots | 2020-10-11 14:28:41.142393-0500 localhost sshd[58922]: Failed password for invalid user crocker from 222.84.117.30 port 25761 ssh2 |
2020-10-12 03:50:06 |
| 37.54.239.184 | attackbots | Port Scan: TCP/443 |
2020-10-12 03:57:43 |
| 95.172.2.234 | attackbotsspam | 1433/tcp [2020-10-11]1pkt |
2020-10-12 03:59:50 |
| 172.81.239.224 | attackbotsspam | Brute-force attempt banned |
2020-10-12 03:53:14 |
| 165.227.72.166 | attack | DATE:2020-10-11 21:10:08, IP:165.227.72.166, PORT:ssh SSH brute force auth (docker-dc) |
2020-10-12 03:31:08 |
| 103.134.73.2 | attackspambots | 445/tcp 445/tcp 445/tcp... [2020-08-15/10-11]7pkt,1pt.(tcp) |
2020-10-12 03:39:17 |
| 34.95.212.150 | attack | Automatic report - Banned IP Access |
2020-10-12 03:37:47 |
| 167.248.133.27 | attack | firewall-block, port(s): 8089/tcp |
2020-10-12 04:05:20 |