City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.42.160.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;128.42.160.108. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:08:58 CST 2025
;; MSG SIZE rcvd: 107
Host 108.160.42.128.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 108.160.42.128.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 76.103.161.19 | attack | Apr 21 06:38:49 web8 sshd\[21722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.103.161.19 user=root Apr 21 06:38:52 web8 sshd\[21722\]: Failed password for root from 76.103.161.19 port 36678 ssh2 Apr 21 06:43:12 web8 sshd\[23996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.103.161.19 user=root Apr 21 06:43:13 web8 sshd\[23996\]: Failed password for root from 76.103.161.19 port 55260 ssh2 Apr 21 06:47:33 web8 sshd\[26175\]: Invalid user admin from 76.103.161.19 |
2020-04-21 14:50:30 |
| 115.49.246.98 | attack | Automatic report - Port Scan Attack |
2020-04-21 14:21:09 |
| 103.221.234.246 | attackspam | Unauthorized access detected from black listed ip! |
2020-04-21 14:28:29 |
| 165.227.50.73 | attackspambots | 165.227.50.73 - - [21/Apr/2020:05:54:39 +0200] "GET /wp-login.php HTTP/1.1" 200 5686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.227.50.73 - - [21/Apr/2020:05:54:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5997 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.227.50.73 - - [21/Apr/2020:05:54:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-21 14:39:19 |
| 66.68.187.145 | attackspambots | " " |
2020-04-21 14:19:52 |
| 185.106.96.161 | attack | sql injection attacks |
2020-04-21 14:28:46 |
| 188.18.255.118 | attackbots | Apr 21 05:54:12 mail sshd\[2062\]: Invalid user administrator from 188.18.255.118 Apr 21 05:54:13 mail sshd\[2062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.18.255.118 Apr 21 05:54:15 mail sshd\[2062\]: Failed password for invalid user administrator from 188.18.255.118 port 6469 ssh2 ... |
2020-04-21 14:58:00 |
| 210.61.148.241 | attackspam | Apr 21 07:34:49 pve1 sshd[15890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.61.148.241 Apr 21 07:34:51 pve1 sshd[15890]: Failed password for invalid user ubuntu from 210.61.148.241 port 35810 ssh2 ... |
2020-04-21 14:26:57 |
| 202.186.38.188 | attack | Invalid user db from 202.186.38.188 port 33074 |
2020-04-21 14:35:01 |
| 89.248.168.221 | attack | [MK-VM3] Blocked by UFW |
2020-04-21 14:40:45 |
| 78.47.242.197 | attack | SSH invalid-user multiple login try |
2020-04-21 14:23:20 |
| 45.143.220.146 | attackspam | 45.143.220.146 was recorded 5 times by 5 hosts attempting to connect to the following ports: 6062,6061. Incident counter (4h, 24h, all-time): 5, 32, 129 |
2020-04-21 14:41:13 |
| 138.204.78.249 | attackbotsspam | 2020-04-21T06:10:29.462364struts4.enskede.local sshd\[17251\]: Invalid user admin from 138.204.78.249 port 41370 2020-04-21T06:10:29.471568struts4.enskede.local sshd\[17251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.78.249 2020-04-21T06:10:33.096435struts4.enskede.local sshd\[17251\]: Failed password for invalid user admin from 138.204.78.249 port 41370 ssh2 2020-04-21T06:15:32.601655struts4.enskede.local sshd\[17325\]: Invalid user oracle from 138.204.78.249 port 59118 2020-04-21T06:15:32.610490struts4.enskede.local sshd\[17325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.78.249 ... |
2020-04-21 14:22:10 |
| 112.85.42.194 | attack | k+ssh-bruteforce |
2020-04-21 14:42:55 |
| 111.230.149.74 | attack | 2020-04-21T07:50:21.279924v22018076590370373 sshd[13187]: Failed password for invalid user admin from 111.230.149.74 port 53108 ssh2 2020-04-21T07:55:42.555724v22018076590370373 sshd[17110]: Invalid user postgres from 111.230.149.74 port 51141 2020-04-21T07:55:42.562665v22018076590370373 sshd[17110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.149.74 2020-04-21T07:55:42.555724v22018076590370373 sshd[17110]: Invalid user postgres from 111.230.149.74 port 51141 2020-04-21T07:55:44.312250v22018076590370373 sshd[17110]: Failed password for invalid user postgres from 111.230.149.74 port 51141 ssh2 ... |
2020-04-21 14:34:39 |