City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.242.73.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.242.73.121. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 05:01:01 CST 2025
;; MSG SIZE rcvd: 107
Host 121.73.242.140.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 121.73.242.140.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.250.96.111 | attack | Lines containing failures of 176.250.96.111 /var/log/mail.err:Sep 2 10:12:18 server01 postfix/smtpd[18393]: warning: hostname b0fa606f.bb.sky.com does not resolve to address 176.250.96.111: Name or service not known /var/log/apache/pucorp.org.log:Sep 2 10:12:18 server01 postfix/smtpd[18393]: warning: hostname b0fa606f.bb.sky.com does not resolve to address 176.250.96.111: Name or service not known /var/log/apache/pucorp.org.log:Sep 2 10:12:18 server01 postfix/smtpd[18393]: connect from unknown[176.250.96.111] /var/log/apache/pucorp.org.log:Sep x@x /var/log/apache/pucorp.org.log:Sep x@x /var/log/apache/pucorp.org.log:Sep 2 10:12:19 server01 postfix/policy-spf[18396]: : Policy action=PREPEND Received-SPF: none (wrhostnameeedge.com: No applicable sender policy available) receiver=x@x /var/log/apache/pucorp.org.log:Sep x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=176.250.96.111 |
2020-09-04 14:09:28 |
| 106.51.113.15 | attackbotsspam | Sep 4 07:51:50 home sshd[630440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.113.15 Sep 4 07:51:50 home sshd[630440]: Invalid user lijing from 106.51.113.15 port 58917 Sep 4 07:51:51 home sshd[630440]: Failed password for invalid user lijing from 106.51.113.15 port 58917 ssh2 Sep 4 07:53:59 home sshd[630675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.113.15 user=root Sep 4 07:54:01 home sshd[630675]: Failed password for root from 106.51.113.15 port 45764 ssh2 ... |
2020-09-04 14:01:49 |
| 81.68.123.65 | attackbots | Sep 4 07:37:14 vps647732 sshd[17865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.123.65 Sep 4 07:37:16 vps647732 sshd[17865]: Failed password for invalid user liyan from 81.68.123.65 port 50444 ssh2 ... |
2020-09-04 13:55:02 |
| 198.98.49.181 | attackspam | Sep 4 05:56:21 ip-172-31-7-133 sshd\[4459\]: Invalid user centos from 198.98.49.181 Sep 4 05:56:21 ip-172-31-7-133 sshd\[4456\]: Invalid user vagrant from 198.98.49.181 Sep 4 05:56:21 ip-172-31-7-133 sshd\[4454\]: Invalid user test from 198.98.49.181 ... |
2020-09-04 14:00:17 |
| 106.13.177.53 | attackbotsspam | 2020-09-03T19:09:42.666756vps1033 sshd[29499]: Invalid user vinci from 106.13.177.53 port 36086 2020-09-03T19:09:42.672948vps1033 sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.177.53 2020-09-03T19:09:42.666756vps1033 sshd[29499]: Invalid user vinci from 106.13.177.53 port 36086 2020-09-03T19:09:44.284405vps1033 sshd[29499]: Failed password for invalid user vinci from 106.13.177.53 port 36086 ssh2 2020-09-03T19:12:55.159727vps1033 sshd[3804]: Invalid user linaro from 106.13.177.53 port 54154 ... |
2020-09-04 14:16:39 |
| 118.107.130.93 | attack | Sep 3 18:48:56 mellenthin postfix/smtpd[20979]: NOQUEUE: reject: RCPT from unknown[118.107.130.93]: 554 5.7.1 Service unavailable; Client host [118.107.130.93] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/118.107.130.93 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-09-04 14:01:31 |
| 107.189.10.101 | attack | SSH bruteforce |
2020-09-04 13:43:29 |
| 104.211.167.49 | attackspambots | Sep 4 05:01:23 ns37 sshd[8108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.167.49 |
2020-09-04 13:47:35 |
| 197.58.171.7 | attack | port scan and connect, tcp 23 (telnet) |
2020-09-04 13:58:11 |
| 14.251.229.180 | attackbotsspam | Sep 3 18:49:20 mellenthin postfix/smtpd[21042]: NOQUEUE: reject: RCPT from unknown[14.251.229.180]: 554 5.7.1 Service unavailable; Client host [14.251.229.180] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/14.251.229.180; from= |
2020-09-04 13:42:04 |
| 190.196.229.117 | attackspam | failed_logins |
2020-09-04 14:02:20 |
| 222.147.137.182 | attackspam |
|
2020-09-04 14:10:10 |
| 106.13.18.86 | attackspam | Sep 4 03:41:33 roki-contabo sshd\[2722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86 user=root Sep 4 03:41:35 roki-contabo sshd\[2722\]: Failed password for root from 106.13.18.86 port 39604 ssh2 Sep 4 03:53:25 roki-contabo sshd\[2837\]: Invalid user www from 106.13.18.86 Sep 4 03:53:25 roki-contabo sshd\[2837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86 Sep 4 03:53:27 roki-contabo sshd\[2837\]: Failed password for invalid user www from 106.13.18.86 port 42920 ssh2 ... |
2020-09-04 14:16:08 |
| 62.193.151.59 | attack | Brute force attempt |
2020-09-04 14:04:26 |
| 180.76.169.198 | attack | Sep 4 07:48:47 lnxweb61 sshd[6979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.198 |
2020-09-04 14:05:07 |