City: Plattsburgh
Region: New York
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: SUNY College at Plattsburgh
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.142.211.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37112
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;137.142.211.11. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019073100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 23:45:28 CST 2019
;; MSG SIZE rcvd: 118
Host 11.211.142.137.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 11.211.142.137.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
80.85.86.175 | attackbots | port scan/probe/communication attempt |
2019-07-31 10:26:49 |
131.221.200.183 | attack | port scan/probe/communication attempt |
2019-07-31 10:12:02 |
59.92.108.183 | attackspam | Unauthorized access to SSH at 30/Jul/2019:22:37:30 +0000. Received: (SSH-2.0-libssh2_1.8.0) |
2019-07-31 10:03:54 |
144.217.91.86 | attackspambots | Jul 31 01:23:30 s64-1 sshd[30448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86 Jul 31 01:23:32 s64-1 sshd[30448]: Failed password for invalid user 123456 from 144.217.91.86 port 58076 ssh2 Jul 31 01:27:50 s64-1 sshd[30526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.91.86 ... |
2019-07-31 10:33:31 |
142.54.101.146 | attack | Jul 31 01:59:08 localhost sshd\[99871\]: Invalid user zimbra from 142.54.101.146 port 29751 Jul 31 01:59:08 localhost sshd\[99871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.54.101.146 Jul 31 01:59:10 localhost sshd\[99871\]: Failed password for invalid user zimbra from 142.54.101.146 port 29751 ssh2 Jul 31 02:03:41 localhost sshd\[100056\]: Invalid user muhahaha from 142.54.101.146 port 42394 Jul 31 02:03:41 localhost sshd\[100056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.54.101.146 ... |
2019-07-31 10:06:06 |
109.86.153.206 | attack | Brute force attempt |
2019-07-31 10:24:10 |
185.12.177.19 | attackbotsspam | port scan/probe/communication attempt |
2019-07-31 10:02:36 |
101.249.9.139 | attackbotsspam | port scan/probe/communication attempt |
2019-07-31 10:22:35 |
148.70.62.94 | attackspam | php vulnerability scanning/probing |
2019-07-31 09:48:58 |
124.156.164.41 | attackbotsspam | Jul 31 04:05:23 dedicated sshd[23455]: Invalid user master from 124.156.164.41 port 38680 |
2019-07-31 10:13:17 |
54.36.148.30 | attackspam | Automatic report - Banned IP Access |
2019-07-31 10:25:05 |
194.78.179.178 | attackbotsspam | $f2bV_matches |
2019-07-31 10:15:50 |
49.247.213.143 | attack | Jul 31 03:15:31 MK-Soft-Root1 sshd\[31740\]: Invalid user facai from 49.247.213.143 port 32896 Jul 31 03:15:31 MK-Soft-Root1 sshd\[31740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.213.143 Jul 31 03:15:33 MK-Soft-Root1 sshd\[31740\]: Failed password for invalid user facai from 49.247.213.143 port 32896 ssh2 ... |
2019-07-31 10:27:37 |
159.203.184.166 | attackbots | port scan/probe/communication attempt |
2019-07-31 10:07:57 |
82.64.15.106 | attack | Triggered by Fail2Ban |
2019-07-31 10:19:58 |