City: Davis
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: University of California at Davis
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.120.20.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40074
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.120.20.11. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019033102 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 01 08:30:32 +08 2019
;; MSG SIZE rcvd: 117
Host 11.20.120.128.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 11.20.120.128.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
173.82.154.230 | attack | Sep 20 12:24:45 sshgateway sshd\[25521\]: Invalid user testcase from 173.82.154.230 Sep 20 12:24:45 sshgateway sshd\[25521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.154.230 Sep 20 12:24:47 sshgateway sshd\[25521\]: Failed password for invalid user testcase from 173.82.154.230 port 41550 ssh2 |
2019-09-20 23:12:27 |
81.213.193.2 | attack | Port Scan: TCP/23 |
2019-09-20 22:47:13 |
183.225.152.2 | attackbotsspam | Port Scan: TCP/21 |
2019-09-20 22:38:03 |
188.235.4.186 | attackspam | Port Scan: TCP/8888 |
2019-09-20 22:36:51 |
178.48.247.58 | attackspambots | Port Scan: TCP/445 |
2019-09-20 22:38:25 |
104.46.4.112 | attack | Port Scan: TCP/6380 |
2019-09-20 22:45:47 |
50.4.181.23 | attackbotsspam | Port Scan: TCP/443 |
2019-09-20 22:53:54 |
197.33.184.84 | attackbots | Port Scan: TCP/23 |
2019-09-20 22:33:29 |
110.80.17.26 | attackbots | Sep 20 16:10:10 yesfletchmain sshd\[20290\]: Invalid user seed from 110.80.17.26 port 55662 Sep 20 16:10:10 yesfletchmain sshd\[20290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26 Sep 20 16:10:13 yesfletchmain sshd\[20290\]: Failed password for invalid user seed from 110.80.17.26 port 55662 ssh2 Sep 20 16:12:34 yesfletchmain sshd\[20360\]: Invalid user hadoop from 110.80.17.26 port 54688 Sep 20 16:12:34 yesfletchmain sshd\[20360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26 ... |
2019-09-20 23:15:13 |
72.228.93.7 | attackbotsspam | Port Scan: UDP/137 |
2019-09-20 23:07:11 |
137.119.113.23 | attack | Port Scan: UDP/137 |
2019-09-20 22:40:39 |
186.52.181.254 | attack | Port Scan: TCP/22 |
2019-09-20 23:02:05 |
184.181.123.232 | attackbots | Port Scan: UDP/820 |
2019-09-20 23:02:16 |
191.253.104.11 | attack | Port Scan: TCP/34567 |
2019-09-20 22:35:07 |
91.135.213.120 | attackspam | 2019-09-20 11:00:44 H=(mail.igvx.ru) [91.135.213.120] F= |
2019-09-20 23:11:33 |