City: unknown
Region: unknown
Country: Canada
Internet Service Provider: Bell
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.170.167.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.170.167.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032801 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 11:40:43 CST 2025
;; MSG SIZE rcvd: 108
Host 104.167.170.142.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 104.167.170.142.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.76.188.2 | attack | 2020-05-06T06:28:06.464739scrat postfix/smtpd[3437168]: NOQUEUE: reject: RCPT from unknown[103.76.188.2]: 450 4.7.25 Client host rejected: cannot find your hostname, [103.76.188.2]; from= |
2020-05-06 12:29:43 |
| 89.248.168.217 | attack | 05/05/2020-23:58:04.247532 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-05-06 12:00:45 |
| 90.65.53.4 | attackbots | May 6 07:13:05 pkdns2 sshd\[33135\]: Invalid user guest from 90.65.53.4May 6 07:13:06 pkdns2 sshd\[33135\]: Failed password for invalid user guest from 90.65.53.4 port 55066 ssh2May 6 07:17:03 pkdns2 sshd\[33354\]: Invalid user ecw from 90.65.53.4May 6 07:17:05 pkdns2 sshd\[33354\]: Failed password for invalid user ecw from 90.65.53.4 port 38698 ssh2May 6 07:21:02 pkdns2 sshd\[33565\]: Invalid user mysql1 from 90.65.53.4May 6 07:21:04 pkdns2 sshd\[33565\]: Failed password for invalid user mysql1 from 90.65.53.4 port 50574 ssh2 ... |
2020-05-06 12:41:45 |
| 60.249.253.179 | attackbotsspam | Telnet Server BruteForce Attack |
2020-05-06 12:17:25 |
| 50.97.62.138 | attackbots | May 6 05:57:45 [host] sshd[8907]: Invalid user ms May 6 05:57:45 [host] sshd[8907]: pam_unix(sshd:a May 6 05:57:47 [host] sshd[8907]: Failed password |
2020-05-06 12:14:26 |
| 103.218.240.33 | attackbots | SSH bruteforce more then 50 syn to 22 port per 10 seconds. |
2020-05-06 12:35:07 |
| 185.234.216.178 | attackbotsspam | May 6 06:08:38 host postfix/smtpd[7029]: warning: unknown[185.234.216.178]: SASL LOGIN authentication failed: authentication failure May 6 06:19:54 host postfix/smtpd[12509]: warning: unknown[185.234.216.178]: SASL LOGIN authentication failed: authentication failure ... |
2020-05-06 12:24:53 |
| 140.143.127.179 | attackspam | Unauthorized connection attempt detected from IP address 140.143.127.179 to port 6338 [T] |
2020-05-06 08:47:57 |
| 217.112.142.179 | attackspam | May 6 06:00:13 mail.srvfarm.net postfix/smtpd[128459]: NOQUEUE: reject: RCPT from unknown[217.112.142.179]: 450 4.1.8 |
2020-05-06 12:24:12 |
| 170.106.50.166 | attackbots | May 5 22:22:54 server1 sshd\[14449\]: Invalid user www from 170.106.50.166 May 5 22:22:54 server1 sshd\[14449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.50.166 May 5 22:22:55 server1 sshd\[14449\]: Failed password for invalid user www from 170.106.50.166 port 37200 ssh2 May 5 22:26:31 server1 sshd\[15543\]: Invalid user qsc from 170.106.50.166 May 5 22:26:31 server1 sshd\[15543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.50.166 ... |
2020-05-06 12:39:57 |
| 36.92.125.241 | attackspam | Unauthorised access (May 6) SRC=36.92.125.241 LEN=52 TTL=119 ID=6015 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-06 12:07:43 |
| 27.72.57.149 | attackbotsspam | Unauthorised access (May 6) SRC=27.72.57.149 LEN=52 TTL=113 ID=9903 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-06 12:22:00 |
| 58.213.116.170 | attack | 2020-05-06T03:55:20.170378shield sshd\[416\]: Invalid user test2 from 58.213.116.170 port 47938 2020-05-06T03:55:20.173784shield sshd\[416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.116.170 2020-05-06T03:55:22.030036shield sshd\[416\]: Failed password for invalid user test2 from 58.213.116.170 port 47938 ssh2 2020-05-06T03:58:02.709218shield sshd\[1088\]: Invalid user user from 58.213.116.170 port 57294 2020-05-06T03:58:02.712768shield sshd\[1088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.116.170 |
2020-05-06 12:02:16 |
| 51.178.24.61 | attack | Brute force attempt |
2020-05-06 12:20:20 |
| 124.89.120.204 | attack | 2020-05-06T05:54:14.556715sd-86998 sshd[17119]: Invalid user git from 124.89.120.204 port 15886 2020-05-06T05:54:14.561975sd-86998 sshd[17119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.89.120.204 2020-05-06T05:54:14.556715sd-86998 sshd[17119]: Invalid user git from 124.89.120.204 port 15886 2020-05-06T05:54:16.358024sd-86998 sshd[17119]: Failed password for invalid user git from 124.89.120.204 port 15886 ssh2 2020-05-06T05:57:57.791476sd-86998 sshd[17602]: Invalid user git from 124.89.120.204 port 43071 ... |
2020-05-06 12:06:38 |