City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.132.191.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.132.191.16. IN A
;; AUTHORITY SECTION:
. 210 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400
;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 15:26:24 CST 2022
;; MSG SIZE rcvd: 107
16.191.132.142.in-addr.arpa domain name pointer static.16.191.132.142.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
16.191.132.142.in-addr.arpa name = static.16.191.132.142.clients.your-server.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
148.70.242.55 | attack | Apr 25 06:52:12 sso sshd[4106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.242.55 Apr 25 06:52:13 sso sshd[4106]: Failed password for invalid user sylwester from 148.70.242.55 port 53140 ssh2 ... |
2020-04-25 17:36:28 |
207.248.127.161 | attackspambots | Invalid user codeunbug from 207.248.127.161 port 58734 |
2020-04-25 17:32:27 |
149.202.48.58 | attack | nginx-botsearch jail |
2020-04-25 17:11:16 |
51.68.121.235 | attackspambots | Apr 25 08:51:02 vmd26974 sshd[27863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.121.235 Apr 25 08:51:04 vmd26974 sshd[27863]: Failed password for invalid user eva from 51.68.121.235 port 59912 ssh2 ... |
2020-04-25 16:59:03 |
59.36.148.31 | attackspambots | Apr 25 05:33:25 vlre-nyc-1 sshd\[29301\]: Invalid user justme from 59.36.148.31 Apr 25 05:33:25 vlre-nyc-1 sshd\[29301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.148.31 Apr 25 05:33:28 vlre-nyc-1 sshd\[29301\]: Failed password for invalid user justme from 59.36.148.31 port 43308 ssh2 Apr 25 05:40:35 vlre-nyc-1 sshd\[29496\]: Invalid user packer from 59.36.148.31 Apr 25 05:40:35 vlre-nyc-1 sshd\[29496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.148.31 ... |
2020-04-25 17:00:50 |
159.65.41.159 | attackspam | $f2bV_matches |
2020-04-25 17:21:38 |
139.199.204.61 | attackspam | Apr 25 07:20:43 home sshd[12333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.204.61 Apr 25 07:20:45 home sshd[12333]: Failed password for invalid user stpi from 139.199.204.61 port 52902 ssh2 Apr 25 07:25:30 home sshd[13011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.204.61 ... |
2020-04-25 17:36:53 |
104.245.144.58 | attackbots | (From snell.sharon56@yahoo.com) Say no to paying tons of cash for ripoff Facebook ads! I can show you a system that charges only a tiny bit of cash and produces an almost endless volume of web visitors to your website Take a look at: http://www.adpostingrobot.xyz |
2020-04-25 17:38:47 |
94.102.50.151 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 35058 proto: TCP cat: Misc Attack |
2020-04-25 17:18:06 |
67.205.142.246 | attackbots | $f2bV_matches |
2020-04-25 17:28:51 |
157.230.61.132 | attackspam | $f2bV_matches |
2020-04-25 17:07:27 |
80.82.78.104 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 60001 proto: TCP cat: Misc Attack |
2020-04-25 17:06:36 |
139.213.72.242 | attack | [portscan] Port scan |
2020-04-25 17:33:38 |
109.238.215.116 | attackspam | xmlrpc attack |
2020-04-25 17:16:53 |
123.56.162.64 | attack | 25.04.2020 04:10:41 Recursive DNS scan |
2020-04-25 17:32:02 |