City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.49.99.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;128.49.99.142. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 11:31:04 CST 2025
;; MSG SIZE rcvd: 106
b'Host 142.99.49.128.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 128.49.99.142.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 107.170.131.23 | attackspam | ... |
2020-09-10 14:19:54 |
| 218.92.0.211 | attack | $f2bV_matches |
2020-09-10 13:56:10 |
| 199.193.204.188 | attackspam | Sent VOIP email and attachment which contained a trojan |
2020-09-10 14:12:52 |
| 49.232.79.23 | attackspambots | Sep 10 07:45:08 markkoudstaal sshd[13383]: Failed password for root from 49.232.79.23 port 33014 ssh2 Sep 10 07:48:01 markkoudstaal sshd[14114]: Failed password for root from 49.232.79.23 port 34678 ssh2 ... |
2020-09-10 14:06:10 |
| 193.228.91.123 | attackspam | (sshd) Failed SSH login from 193.228.91.123 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 10 05:57:42 cloud16 sshd[29863]: Did not receive identification string from 193.228.91.123 Sep 10 06:02:20 cloud16 sshd[1061]: Invalid user user from 193.228.91.123 Sep 10 06:02:47 cloud16 sshd[1378]: Invalid user git from 193.228.91.123 Sep 10 06:03:15 cloud16 sshd[1448]: Invalid user postgres from 193.228.91.123 Sep 10 06:03:44 cloud16 sshd[1701]: Invalid user oracle from 193.228.91.123 |
2020-09-10 14:06:36 |
| 185.191.171.7 | attack | caw-Joomla User : try to access forms... |
2020-09-10 14:35:52 |
| 61.177.172.168 | attackbotsspam | Sep 10 03:34:27 firewall sshd[19846]: Failed password for root from 61.177.172.168 port 64760 ssh2 Sep 10 03:34:32 firewall sshd[19846]: Failed password for root from 61.177.172.168 port 64760 ssh2 Sep 10 03:34:35 firewall sshd[19846]: Failed password for root from 61.177.172.168 port 64760 ssh2 ... |
2020-09-10 14:34:45 |
| 111.229.79.169 | attackspambots | Sep 10 08:10:24 eventyay sshd[18686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.169 Sep 10 08:10:26 eventyay sshd[18686]: Failed password for invalid user gitadmin from 111.229.79.169 port 56184 ssh2 Sep 10 08:15:21 eventyay sshd[18779]: Failed password for root from 111.229.79.169 port 51870 ssh2 ... |
2020-09-10 14:35:01 |
| 91.134.138.46 | attackspambots | Failed password for invalid user zhong from 91.134.138.46 port 35676 ssh2 |
2020-09-10 14:33:57 |
| 108.30.160.14 | attackspam | 2020-09-09T22:15:12.296509correo.[domain] sshd[20926]: Failed password for root from 108.30.160.14 port 42830 ssh2 2020-09-09T22:19:52.844225correo.[domain] sshd[21258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-108-30-160-14.nycmny.fios.verizon.net user=root 2020-09-09T22:19:55.427245correo.[domain] sshd[21258]: Failed password for root from 108.30.160.14 port 38634 ssh2 ... |
2020-09-10 14:08:51 |
| 139.59.18.215 | attackspambots | Sep 9 20:20:43 sachi sshd\[22856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.215 user=root Sep 9 20:20:45 sachi sshd\[22856\]: Failed password for root from 139.59.18.215 port 33172 ssh2 Sep 9 20:24:54 sachi sshd\[23154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.215 user=root Sep 9 20:24:56 sachi sshd\[23154\]: Failed password for root from 139.59.18.215 port 38574 ssh2 Sep 9 20:29:08 sachi sshd\[23467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.215 user=root |
2020-09-10 14:30:26 |
| 85.27.207.59 | attackbots | Sep 9 12:56:06 aragorn sshd[16308]: Invalid user admin from 85.27.207.59 Sep 9 12:56:07 aragorn sshd[16310]: Invalid user admin from 85.27.207.59 Sep 9 12:56:08 aragorn sshd[16312]: Invalid user admin from 85.27.207.59 Sep 9 12:56:09 aragorn sshd[16314]: Invalid user admin from 85.27.207.59 ... |
2020-09-10 14:05:58 |
| 122.51.68.119 | attack | $f2bV_matches |
2020-09-10 14:27:43 |
| 220.66.155.2 | attack | Dovecot Invalid User Login Attempt. |
2020-09-10 14:21:41 |
| 112.85.42.67 | attackbotsspam | Sep 10 12:44:50 webhost01 sshd[23278]: Failed password for root from 112.85.42.67 port 49543 ssh2 ... |
2020-09-10 14:04:59 |