City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.42.148.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.42.148.44. IN A
;; AUTHORITY SECTION:
. 116 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040103 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 02 10:29:24 CST 2022
;; MSG SIZE rcvd: 106
Host 44.148.42.141.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.148.42.141.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
90.215.0.10 | attack | unauthorized connection attempt |
2020-02-28 16:12:42 |
223.155.84.224 | attackbotsspam | 1582865651 - 02/28/2020 11:54:11 Host: 223.155.84.224/223.155.84.224 Port: 11211 UDP Blocked ... |
2020-02-28 16:02:17 |
54.38.190.187 | attack | Feb 28 07:19:24 lnxweb62 sshd[32253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.190.187 |
2020-02-28 15:46:12 |
41.208.150.114 | attackspam | Feb 28 08:49:02 silence02 sshd[23373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114 Feb 28 08:49:03 silence02 sshd[23373]: Failed password for invalid user law from 41.208.150.114 port 48958 ssh2 Feb 28 08:55:53 silence02 sshd[23791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114 |
2020-02-28 16:14:17 |
118.127.52.232 | attackbotsspam | [ 🇳🇱 ] REQUEST: ///admin/images/ |
2020-02-28 16:12:04 |
171.220.243.192 | attackbots | Feb 28 04:54:38 IngegnereFirenze sshd[1260]: Failed password for invalid user yangxg from 171.220.243.192 port 41682 ssh2 ... |
2020-02-28 15:38:21 |
198.23.210.133 | attack | Brute forcing email accounts |
2020-02-28 16:05:38 |
61.252.141.83 | attack | Feb 28 02:36:21 NPSTNNYC01T sshd[7916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.252.141.83 Feb 28 02:36:22 NPSTNNYC01T sshd[7916]: Failed password for invalid user mapred from 61.252.141.83 port 45612 ssh2 Feb 28 02:43:25 NPSTNNYC01T sshd[8440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.252.141.83 ... |
2020-02-28 15:45:50 |
142.93.163.77 | attackspambots | Feb 27 21:40:48 tdfoods sshd\[8663\]: Invalid user a from 142.93.163.77 Feb 27 21:40:48 tdfoods sshd\[8663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 Feb 27 21:40:50 tdfoods sshd\[8663\]: Failed password for invalid user a from 142.93.163.77 port 59518 ssh2 Feb 27 21:49:39 tdfoods sshd\[9564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 user=root Feb 27 21:49:41 tdfoods sshd\[9564\]: Failed password for root from 142.93.163.77 port 45148 ssh2 |
2020-02-28 16:03:03 |
129.211.62.194 | attackspam | Feb 28 08:15:14 * sshd[719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.194 Feb 28 08:15:16 * sshd[719]: Failed password for invalid user maverick from 129.211.62.194 port 57196 ssh2 |
2020-02-28 15:43:32 |
51.75.206.42 | attackbotsspam | Feb 27 21:11:54 eddieflores sshd\[23899\]: Invalid user media from 51.75.206.42 Feb 27 21:11:54 eddieflores sshd\[23899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.ip-51-75-206.eu Feb 27 21:11:56 eddieflores sshd\[23899\]: Failed password for invalid user media from 51.75.206.42 port 35482 ssh2 Feb 27 21:20:25 eddieflores sshd\[24533\]: Invalid user maxwell from 51.75.206.42 Feb 27 21:20:25 eddieflores sshd\[24533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.ip-51-75-206.eu |
2020-02-28 15:42:48 |
201.242.109.38 | attackspam | Honeypot attack, port: 445, PTR: 201-242-109-38.genericrev.cantv.net. |
2020-02-28 16:01:49 |
42.112.137.110 | attack | Email rejected due to spam filtering |
2020-02-28 16:01:11 |
36.72.219.98 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-28 16:19:11 |
223.16.15.191 | attackspambots | Honeypot attack, port: 5555, PTR: 191-15-16-223-on-nets.com. |
2020-02-28 15:56:19 |