City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.121.25.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.121.25.42. IN A
;; AUTHORITY SECTION:
. 402 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 10:39:43 CST 2022
;; MSG SIZE rcvd: 106
42.25.121.124.in-addr.arpa domain name pointer ppp-124-121-25-42.revip2.asianet.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.25.121.124.in-addr.arpa name = ppp-124-121-25-42.revip2.asianet.co.th.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
79.124.62.86 | attackspambots | Oct 13 19:02:40 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=21421 PROTO=TCP SPT=52019 DPT=424 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 19:02:59 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=61455 PROTO=TCP SPT=52019 DPT=41714 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 19:03:25 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=48511 PROTO=TCP SPT=52019 DPT=27516 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 19:03:45 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=64305 PROTO=TCP SPT=52019 DPT=14329 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 19: ... |
2020-10-14 01:49:36 |
119.110.206.2 | attackbots | Unauthorized connection attempt from IP address 119.110.206.2 on Port 445(SMB) |
2020-10-14 02:05:58 |
5.196.75.140 | attackbotsspam | 5.196.75.140 (FR/France/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 13 13:55:10 server2 sshd[16513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.151.177.85 user=root Oct 13 14:02:10 server2 sshd[20255]: Failed password for root from 51.68.199.188 port 47498 ssh2 Oct 13 13:55:12 server2 sshd[16513]: Failed password for root from 62.151.177.85 port 42326 ssh2 Oct 13 14:00:26 server2 sshd[19233]: Failed password for root from 144.34.207.84 port 56404 ssh2 Oct 13 14:00:54 server2 sshd[19357]: Failed password for root from 5.196.75.140 port 32878 ssh2 IP Addresses Blocked: 62.151.177.85 (US/United States/-) 51.68.199.188 (GB/United Kingdom/-) 144.34.207.84 (US/United States/-) |
2020-10-14 02:13:02 |
103.89.176.74 | attackbotsspam | Oct 13 19:51:26 abendstille sshd\[24518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.74 user=root Oct 13 19:51:28 abendstille sshd\[24518\]: Failed password for root from 103.89.176.74 port 54100 ssh2 Oct 13 19:55:17 abendstille sshd\[29206\]: Invalid user menyhart from 103.89.176.74 Oct 13 19:55:17 abendstille sshd\[29206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.74 Oct 13 19:55:19 abendstille sshd\[29206\]: Failed password for invalid user menyhart from 103.89.176.74 port 50162 ssh2 ... |
2020-10-14 02:05:27 |
52.157.106.88 | attack | Invalid user artem from 52.157.106.88 port 60056 |
2020-10-14 02:04:05 |
111.231.62.217 | attackspambots | 2020-10-13T17:36:54.171733shield sshd\[16304\]: Invalid user keller from 111.231.62.217 port 34852 2020-10-13T17:36:54.182043shield sshd\[16304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.62.217 2020-10-13T17:36:56.009542shield sshd\[16304\]: Failed password for invalid user keller from 111.231.62.217 port 34852 ssh2 2020-10-13T17:41:35.742536shield sshd\[17059\]: Invalid user admin from 111.231.62.217 port 58326 2020-10-13T17:41:35.754741shield sshd\[17059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.62.217 |
2020-10-14 01:55:02 |
62.96.251.229 | attackbots | detected by Fail2Ban |
2020-10-14 02:00:02 |
70.160.131.117 | attackbots | Oct 12 23:55:08 askasleikir sshd[17367]: Connection closed by 70.160.131.117 port 50354 [preauth] |
2020-10-14 02:01:58 |
177.71.154.242 | attack | Oct 13 12:38:15 ws19vmsma01 sshd[77001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.71.154.242 Oct 13 12:38:17 ws19vmsma01 sshd[77001]: Failed password for invalid user jesus from 177.71.154.242 port 51350 ssh2 ... |
2020-10-14 02:29:33 |
51.178.155.235 | attackspam | MYH,DEF GET /wp-login.php |
2020-10-14 02:00:55 |
156.96.44.121 | attack | [2020-10-12 18:45:10] NOTICE[1182][C-000036c7] chan_sip.c: Call from '' (156.96.44.121:65220) to extension '01146812410486' rejected because extension not found in context 'public'. [2020-10-12 18:45:10] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-12T18:45:10.707-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146812410486",SessionID="0x7f22f840cf98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.44.121/65220",ACLName="no_extension_match" [2020-10-12 18:55:10] NOTICE[1182][C-000036d4] chan_sip.c: Call from '' (156.96.44.121:51383) to extension '901146812410486' rejected because extension not found in context 'public'. [2020-10-12 18:55:10] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-12T18:55:10.333-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146812410486",SessionID="0x7f22f840f098",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/15 ... |
2020-10-14 02:09:49 |
172.67.28.198 | attackbotsspam | deny from zare.com cloudflare.com #always bad traffic |
2020-10-14 02:13:49 |
161.35.167.228 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2020-10-14 01:59:38 |
158.69.74.240 | attack | Oct 12 02:32:21 HOST sshd[5268]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 12 02:32:23 HOST sshd[5268]: Failed password for invalid user gyoshi from 158.69.74.240 port 28114 ssh2 Oct 12 02:32:23 HOST sshd[5268]: Received disconnect from 158.69.74.240: 11: Bye Bye [preauth] Oct 12 02:36:05 HOST sshd[5396]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 12 02:36:05 HOST sshd[5396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.74.240 user=r.r Oct 12 02:36:06 HOST sshd[5396]: Failed password for r.r from 158.69.74.240 port 9480 ssh2 Oct 12 02:36:06 HOST sshd[5396]: Received disconnect from 158.69.74.240: 11: Bye Bye [preauth] Oct 12 02:37:36 HOST sshd[5425]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 12 02:37........ ------------------------------- |
2020-10-14 02:01:36 |
181.29.248.190 | attackspambots | Automatic report - Port Scan Attack |
2020-10-14 02:18:04 |