City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.8.161.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.8.161.42. IN A
;; AUTHORITY SECTION:
. 508 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021102 1800 900 604800 86400
;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 05:32:09 CST 2020
;; MSG SIZE rcvd: 115
Host 42.161.8.12.in-addr.arpa not found: 2(SERVFAIL)
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
*** Can't find 42.161.8.12.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.186.175.212 | attack | Fail2Ban - SSH Bruteforce Attempt |
2019-10-13 08:24:04 |
14.225.11.25 | attack | SSH Brute Force, server-1 sshd[22998]: Failed password for invalid user 123QAZWSXEDC from 14.225.11.25 port 36532 ssh2 |
2019-10-13 08:19:38 |
178.159.4.62 | attackspambots | Oct 13 02:11:18 SilenceServices sshd[15007]: Failed password for root from 178.159.4.62 port 35696 ssh2 Oct 13 02:15:21 SilenceServices sshd[16065]: Failed password for root from 178.159.4.62 port 48190 ssh2 |
2019-10-13 08:27:22 |
134.209.108.106 | attackspam | Oct 12 23:57:55 plusreed sshd[23138]: Invalid user steamuser from 134.209.108.106 ... |
2019-10-13 12:08:52 |
92.188.124.228 | attack | Oct 12 13:56:00 sachi sshd\[27613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228 user=root Oct 12 13:56:02 sachi sshd\[27613\]: Failed password for root from 92.188.124.228 port 52374 ssh2 Oct 12 13:59:31 sachi sshd\[27887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228 user=root Oct 12 13:59:33 sachi sshd\[27887\]: Failed password for root from 92.188.124.228 port 59640 ssh2 Oct 12 14:02:58 sachi sshd\[28213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228 user=root |
2019-10-13 08:17:36 |
79.110.18.114 | attackbotsspam | B: Magento admin pass test (wrong country) |
2019-10-13 08:29:12 |
222.186.175.169 | attack | SSH Brute Force, server-1 sshd[22937]: Failed password for root from 222.186.175.169 port 11542 ssh2 |
2019-10-13 08:05:11 |
27.17.35.34 | attackbotsspam | port scan and connect, tcp 1433 (ms-sql-s) |
2019-10-13 12:04:22 |
94.23.62.187 | attackspambots | SSH Brute Force, server-1 sshd[23001]: Failed password for invalid user test from 94.23.62.187 port 50740 ssh2 |
2019-10-13 08:17:19 |
49.235.22.230 | attackbots | Oct 13 01:46:19 dedicated sshd[8767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.22.230 user=root Oct 13 01:46:21 dedicated sshd[8767]: Failed password for root from 49.235.22.230 port 34122 ssh2 |
2019-10-13 08:21:39 |
51.91.158.65 | attackbotsspam | Oct 13 05:58:21 vps01 sshd[22282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.158.65 Oct 13 05:58:24 vps01 sshd[22282]: Failed password for invalid user sk from 51.91.158.65 port 47948 ssh2 |
2019-10-13 12:10:50 |
128.199.107.252 | attackspam | 2019-10-13T03:57:52.363258abusebot-4.cloudsearch.cf sshd\[15877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252 user=root |
2019-10-13 12:10:32 |
153.36.242.143 | attackspambots | SSH Brute Force, server-1 sshd[23547]: Failed password for root from 153.36.242.143 port 44467 ssh2 |
2019-10-13 08:12:09 |
103.76.252.6 | attackspam | Oct 13 06:49:41 pkdns2 sshd\[2501\]: Invalid user Sporting2016 from 103.76.252.6Oct 13 06:49:43 pkdns2 sshd\[2501\]: Failed password for invalid user Sporting2016 from 103.76.252.6 port 4737 ssh2Oct 13 06:53:50 pkdns2 sshd\[2880\]: Invalid user Beauty@2017 from 103.76.252.6Oct 13 06:53:53 pkdns2 sshd\[2880\]: Failed password for invalid user Beauty@2017 from 103.76.252.6 port 56641 ssh2Oct 13 06:57:44 pkdns2 sshd\[3073\]: Invalid user Qwer123!@\# from 103.76.252.6Oct 13 06:57:46 pkdns2 sshd\[3073\]: Failed password for invalid user Qwer123!@\# from 103.76.252.6 port 45217 ssh2 ... |
2019-10-13 12:13:23 |
89.248.160.193 | attackbots | 10/12/2019-19:34:55.973777 89.248.160.193 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 97 |
2019-10-13 08:00:47 |