City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.21.75.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.21.75.242. IN A
;; AUTHORITY SECTION:
. 289 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 04:20:20 CST 2022
;; MSG SIZE rcvd: 106
Host 242.75.21.121.in-addr.arpa not found: 2(SERVFAIL)
server can't find 121.21.75.242.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
159.253.32.120 | attackspambots | 159.253.32.120 - - \[05/Nov/2019:06:24:41 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 159.253.32.120 - - \[05/Nov/2019:06:24:43 +0000\] "POST /wp-login.php HTTP/1.1" 200 4219 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-11-05 18:51:56 |
134.175.229.28 | attack | Nov 5 05:27:57 h2040555 sshd[15646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.229.28 user=r.r Nov 5 05:27:59 h2040555 sshd[15646]: Failed password for r.r from 134.175.229.28 port 53468 ssh2 Nov 5 05:27:59 h2040555 sshd[15646]: Received disconnect from 134.175.229.28: 11: Bye Bye [preauth] Nov 5 05:50:23 h2040555 sshd[15903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.229.28 user=r.r Nov 5 05:50:25 h2040555 sshd[15903]: Failed password for r.r from 134.175.229.28 port 59350 ssh2 Nov 5 05:50:25 h2040555 sshd[15903]: Received disconnect from 134.175.229.28: 11: Bye Bye [preauth] Nov 5 05:55:06 h2040555 sshd[15947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.229.28 user=r.r Nov 5 05:55:08 h2040555 sshd[15947]: Failed password for r.r from 134.175.229.28 port 39506 ssh2 Nov 5 05:55:09 h2040555 sshd[15947........ ------------------------------- |
2019-11-05 19:05:43 |
117.50.45.254 | attack | Nov 5 10:34:16 vpn01 sshd[4367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.45.254 Nov 5 10:34:18 vpn01 sshd[4367]: Failed password for invalid user FUWUQInet!@ from 117.50.45.254 port 33820 ssh2 ... |
2019-11-05 18:47:52 |
123.206.87.154 | attack | Automatic report - Banned IP Access |
2019-11-05 18:33:53 |
14.162.24.45 | attackbots | Unauthorised access (Nov 5) SRC=14.162.24.45 LEN=52 TTL=116 ID=25630 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-05 18:36:47 |
182.243.121.76 | attackspam | Portscan detected |
2019-11-05 19:08:15 |
50.68.176.225 | attackspam | TCP Port Scanning |
2019-11-05 18:47:03 |
212.92.106.86 | attack | scan z |
2019-11-05 19:02:06 |
81.169.143.234 | attackspam | Nov 5 07:42:54 SilenceServices sshd[7228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.169.143.234 Nov 5 07:42:56 SilenceServices sshd[7228]: Failed password for invalid user untimely from 81.169.143.234 port 47621 ssh2 Nov 5 07:47:07 SilenceServices sshd[8456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.169.143.234 |
2019-11-05 18:53:14 |
45.122.221.42 | attack | Nov 5 06:25:00 unicornsoft sshd\[12727\]: Invalid user hadoop from 45.122.221.42 Nov 5 06:25:00 unicornsoft sshd\[12727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.221.42 Nov 5 06:25:01 unicornsoft sshd\[12727\]: Failed password for invalid user hadoop from 45.122.221.42 port 55334 ssh2 |
2019-11-05 18:38:44 |
49.234.179.127 | attackspambots | Nov 5 10:30:53 server sshd\[1362\]: Invalid user Orlando from 49.234.179.127 port 59998 Nov 5 10:30:53 server sshd\[1362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127 Nov 5 10:30:55 server sshd\[1362\]: Failed password for invalid user Orlando from 49.234.179.127 port 59998 ssh2 Nov 5 10:34:28 server sshd\[7318\]: Invalid user 123456 from 49.234.179.127 port 60460 Nov 5 10:34:28 server sshd\[7318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127 |
2019-11-05 19:11:14 |
14.225.17.9 | attack | SSH bruteforce (Triggered fail2ban) |
2019-11-05 18:43:00 |
222.86.159.208 | attackspambots | Nov 5 09:32:21 SilenceServices sshd[7387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.86.159.208 Nov 5 09:32:23 SilenceServices sshd[7387]: Failed password for invalid user rmsmnt from 222.86.159.208 port 41283 ssh2 Nov 5 09:38:21 SilenceServices sshd[9030]: Failed password for root from 222.86.159.208 port 59678 ssh2 |
2019-11-05 19:03:47 |
196.52.43.61 | attackspam | Honeypot attack, port: 135, PTR: 196.52.43.61.netsystemsresearch.com. |
2019-11-05 19:04:01 |
104.236.31.227 | attackspam | *Port Scan* detected from 104.236.31.227 (US/United States/-). 4 hits in the last 25 seconds |
2019-11-05 18:39:33 |