City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.216.78.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.216.78.75. IN A
;; AUTHORITY SECTION:
. 307 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:16:54 CST 2022
;; MSG SIZE rcvd: 106
75.78.216.141.in-addr.arpa domain name pointer umf-dc2.umflint.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
75.78.216.141.in-addr.arpa name = umf-dc2.umflint.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 202.109.189.155 | attackspam | CN_MAINT-IP-WWF_<177>1583211036 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 202.109.189.155:59663 |
2020-03-03 19:40:43 |
| 178.254.1.58 | attackbots | Mar 3 10:38:13 l02a sshd[3609]: Invalid user test from 178.254.1.58 Mar 3 10:38:15 l02a sshd[3609]: Failed password for invalid user test from 178.254.1.58 port 59120 ssh2 Mar 3 10:38:13 l02a sshd[3609]: Invalid user test from 178.254.1.58 Mar 3 10:38:15 l02a sshd[3609]: Failed password for invalid user test from 178.254.1.58 port 59120 ssh2 |
2020-03-03 19:49:34 |
| 104.236.246.16 | attack | Brute-force attempt banned |
2020-03-03 19:47:13 |
| 59.127.222.48 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-03 19:50:33 |
| 103.214.129.204 | attackbotsspam | (sshd) Failed SSH login from 103.214.129.204 (IN/India/undefined.hostname.localhost): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 3 12:18:28 amsweb01 sshd[9588]: Invalid user nx from 103.214.129.204 port 59182 Mar 3 12:18:30 amsweb01 sshd[9588]: Failed password for invalid user nx from 103.214.129.204 port 59182 ssh2 Mar 3 12:30:30 amsweb01 sshd[10939]: Invalid user gitlab-runner from 103.214.129.204 port 39366 Mar 3 12:30:32 amsweb01 sshd[10939]: Failed password for invalid user gitlab-runner from 103.214.129.204 port 39366 ssh2 Mar 3 12:42:33 amsweb01 sshd[12190]: Invalid user lianwei from 103.214.129.204 port 47782 |
2020-03-03 19:47:27 |
| 185.53.88.26 | attackbotsspam | [2020-03-03 06:09:57] NOTICE[1148][C-0000db2a] chan_sip.c: Call from '' (185.53.88.26:52811) to extension '9011442037694876' rejected because extension not found in context 'public'. [2020-03-03 06:09:57] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-03T06:09:57.664-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442037694876",SessionID="0x7fd82c7b7d58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.26/52811",ACLName="no_extension_match" [2020-03-03 06:09:58] NOTICE[1148][C-0000db2b] chan_sip.c: Call from '' (185.53.88.26:55088) to extension '901146812111747' rejected because extension not found in context 'public'. [2020-03-03 06:09:58] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-03T06:09:58.446-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146812111747",SessionID="0x7fd82c4d9f48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/1 ... |
2020-03-03 19:29:05 |
| 36.72.216.137 | attack | 1583211040 - 03/03/2020 05:50:40 Host: 36.72.216.137/36.72.216.137 Port: 445 TCP Blocked |
2020-03-03 19:36:52 |
| 192.241.205.159 | attackspam | " " |
2020-03-03 19:13:30 |
| 156.0.66.241 | attack | Port 22 Scan, PTR: PTR record not found |
2020-03-03 19:15:28 |
| 35.240.145.52 | attack | 2020-03-03T04:15:07.555938linuxbox-skyline sshd[105591]: Invalid user postgres from 35.240.145.52 port 50678 ... |
2020-03-03 19:28:36 |
| 106.12.136.242 | attackspambots | Mar 3 10:15:05 ArkNodeAT sshd\[3220\]: Invalid user james from 106.12.136.242 Mar 3 10:15:05 ArkNodeAT sshd\[3220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.136.242 Mar 3 10:15:07 ArkNodeAT sshd\[3220\]: Failed password for invalid user james from 106.12.136.242 port 55268 ssh2 |
2020-03-03 19:21:17 |
| 124.122.11.231 | attackbots | Automatic report - Port Scan Attack |
2020-03-03 19:29:30 |
| 116.111.11.147 | attack | Automatic report - Port Scan Attack |
2020-03-03 19:11:52 |
| 51.75.25.12 | attack | Mar 3 03:57:53 server sshd\[21070\]: Failed password for invalid user nx from 51.75.25.12 port 55420 ssh2 Mar 3 10:02:34 server sshd\[23042\]: Invalid user sinusbot1 from 51.75.25.12 Mar 3 10:02:34 server sshd\[23042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.hugo-benchetrit.fr Mar 3 10:02:36 server sshd\[23042\]: Failed password for invalid user sinusbot1 from 51.75.25.12 port 57082 ssh2 Mar 3 10:11:09 server sshd\[24607\]: Invalid user gzw from 51.75.25.12 ... |
2020-03-03 19:41:38 |
| 106.12.51.193 | attackspam | Mar 3 12:06:55 jane sshd[18236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.51.193 Mar 3 12:06:57 jane sshd[18236]: Failed password for invalid user sharon from 106.12.51.193 port 33214 ssh2 ... |
2020-03-03 19:20:06 |