City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.199.42.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.199.42.142. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:35:37 CST 2022
;; MSG SIZE rcvd: 107
142.42.199.138.in-addr.arpa domain name pointer unn-138-199-42-142.datapacket.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.42.199.138.in-addr.arpa name = unn-138-199-42-142.datapacket.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.134.179.57 | attackspam | May 26 19:03:17 debian-2gb-nbg1-2 kernel: \[12771395.914175\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=10368 PROTO=TCP SPT=44651 DPT=5642 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-27 01:04:47 |
142.93.6.190 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-05-27 01:01:02 |
116.110.146.9 | attack | May 27 00:53:33 bacztwo sshd[29761]: Invalid user admin from 116.110.146.9 port 32112 May 27 00:53:36 bacztwo sshd[29783]: Invalid user admin from 116.110.146.9 port 12000 May 27 00:53:36 bacztwo sshd[29783]: Invalid user admin from 116.110.146.9 port 12000 May 27 00:53:36 bacztwo sshd[29866]: Invalid user support from 116.110.146.9 port 26176 May 27 00:53:36 bacztwo sshd[29866]: Invalid user support from 116.110.146.9 port 26176 ... |
2020-05-27 01:03:28 |
182.73.47.154 | attack | 2020-05-26T17:56:17.038722centos sshd[8387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.47.154 2020-05-26T17:56:17.029455centos sshd[8387]: Invalid user test from 182.73.47.154 port 54964 2020-05-26T17:56:19.297165centos sshd[8387]: Failed password for invalid user test from 182.73.47.154 port 54964 ssh2 ... |
2020-05-27 01:18:50 |
51.255.47.133 | attack | May 26 19:55:30 root sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.ip-51-255-47.eu user=root May 26 19:55:31 root sshd[31880]: Failed password for root from 51.255.47.133 port 44438 ssh2 ... |
2020-05-27 01:33:15 |
115.79.208.117 | attackbotsspam | May 26 19:03:01 vpn01 sshd[4842]: Failed password for root from 115.79.208.117 port 43293 ssh2 ... |
2020-05-27 01:20:01 |
104.248.5.69 | attackbotsspam | May 26 17:56:22 ajax sshd[13632]: Failed password for root from 104.248.5.69 port 48108 ssh2 |
2020-05-27 01:28:58 |
51.178.50.119 | attackspam | May 26 18:51:14 server sshd[4394]: Failed password for root from 51.178.50.119 port 49906 ssh2 May 26 18:54:44 server sshd[4568]: Failed password for backup from 51.178.50.119 port 53910 ssh2 ... |
2020-05-27 01:29:30 |
222.186.180.142 | attackbots | May 26 19:00:17 vps647732 sshd[26802]: Failed password for root from 222.186.180.142 port 20983 ssh2 ... |
2020-05-27 01:07:40 |
8.30.197.230 | attackspambots | invalid user |
2020-05-27 01:10:21 |
86.96.55.208 | attack | 86.96.55.208 - - \[26/May/2020:08:56:08 -0700\] "POST /index.php/admin HTTP/1.1" 404 2040786.96.55.208 - - \[26/May/2020:08:56:08 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 2043586.96.55.208 - - \[26/May/2020:08:56:12 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 20411 ... |
2020-05-27 01:20:48 |
95.84.146.201 | attackbots | May 26 18:49:44 vpn01 sshd[4543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.84.146.201 May 26 18:49:46 vpn01 sshd[4543]: Failed password for invalid user ftp from 95.84.146.201 port 38690 ssh2 ... |
2020-05-27 01:22:19 |
106.75.34.221 | attackspambots | May 26 18:51:18 lukav-desktop sshd\[22592\]: Invalid user sun from 106.75.34.221 May 26 18:51:18 lukav-desktop sshd\[22592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.34.221 May 26 18:51:20 lukav-desktop sshd\[22592\]: Failed password for invalid user sun from 106.75.34.221 port 56824 ssh2 May 26 18:56:37 lukav-desktop sshd\[22638\]: Invalid user ming from 106.75.34.221 May 26 18:56:37 lukav-desktop sshd\[22638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.34.221 |
2020-05-27 01:00:05 |
80.210.18.193 | attackspambots | ... |
2020-05-27 01:11:23 |
113.161.42.46 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-05-27 00:59:11 |