City: Regina
Region: Saskatchewan
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.3.73.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.3.73.2. IN A
;; AUTHORITY SECTION:
. 157 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024011800 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 18 19:20:33 CST 2024
;; MSG SIZE rcvd: 103
2.73.3.142.in-addr.arpa domain name pointer alfano.kandh.uregina.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.73.3.142.in-addr.arpa name = alfano.kandh.uregina.ca.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 170.130.174.56 | attackspambots | 2020-03-18 08:59:23 H=(0285e22c.memoryshack.best) [170.130.174.56]:42697 I=[192.147.25.65]:25 F= |
2020-03-19 02:47:17 |
| 138.128.209.35 | attackbots | $f2bV_matches |
2020-03-19 03:13:41 |
| 2606:4700:20::681a:56 | spam | AGAIN and AGAIN and ALWAYS the same REGISTRARS as namecheap.com, whoisguard.com, namesilo.com, privacyguardian.org and cloudflare.com TO STOP IMMEDIATELY for keeping SPAMMERS, LIERS, ROBERS and else since too many years ! The cheapest service, as usual... And Link as usual by bit.ly to delette IMMEDIATELY too ! MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord ! surfsupport.club => namecheap.com => whoisguard.com surfsupport.club => 192.64.119.6 162.255.119.153 => namecheap.com https://www.mywot.com/scorecard/surfsupport.club https://www.mywot.com/scorecard/namecheap.com https://www.mywot.com/scorecard/whoisguard.com https://en.asytech.cn/check-ip/162.255.119.153 AS USUAL since few days for PHISHING and SCAM send to : http://bit.ly/412dd4z which resend to : https://enticingse.com/fr-carrefour/?s1=16T&s2=d89bb555-d96f-468b-b60b-1dc635000f2b&s3=&s4=&s5=&Fname=&Lname=&Email=#/0 enticingse.com => namesilo.com => privacyguardian.org enticingse.com => 104.27.177.33 104.27.177.33 => cloudflare.com namesilo.com => 104.17.175.85 privacyguardian.org => 2606:4700:20::681a:56 => cloudflare.com https://www.mywot.com/scorecard/enticingse.com https://www.mywot.com/scorecard/namesilo.com https://www.mywot.com/scorecard/privacyguardian.org https://www.mywot.com/scorecard/cloudflare.com https://en.asytech.cn/check-ip/104.27.177.33 https://en.asytech.cn/check-ip/2606:4700:20::681a:56 |
2020-03-19 03:06:56 |
| 137.119.19.98 | attackbotsspam | Automatic report - Port Scan Attack |
2020-03-19 02:55:52 |
| 116.206.15.49 | attack | Honeypot attack, port: 445, PTR: subs31-116-206-15-49.three.co.id. |
2020-03-19 02:57:25 |
| 190.117.62.241 | attack | Brute-force attempt banned |
2020-03-19 02:42:46 |
| 51.15.204.102 | attackspambots | Mar 15 17:15:59 mx01 sshd[21415]: reveeclipse mapping checking getaddrinfo for 102-204-15-51.rev.cloud.scaleway.com [51.15.204.102] failed - POSSIBLE BREAK-IN ATTEMPT! Mar 15 17:15:59 mx01 sshd[21415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.102 user=r.r Mar 15 17:16:01 mx01 sshd[21415]: Failed password for r.r from 51.15.204.102 port 51982 ssh2 Mar 15 17:16:01 mx01 sshd[21415]: Received disconnect from 51.15.204.102: 11: Bye Bye [preauth] Mar 15 17:16:02 mx01 sshd[21434]: reveeclipse mapping checking getaddrinfo for 102-204-15-51.rev.cloud.scaleway.com [51.15.204.102] failed - POSSIBLE BREAK-IN ATTEMPT! Mar 15 17:16:02 mx01 sshd[21434]: Invalid user admin from 51.15.204.102 Mar 15 17:16:02 mx01 sshd[21434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.102 Mar 15 17:16:04 mx01 sshd[21434]: Failed password for invalid user admin from 51.15.204.102 port 56708 s........ ------------------------------- |
2020-03-19 02:38:41 |
| 112.94.191.158 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-03-19 03:18:12 |
| 194.184.198.62 | attack | Mar 18 18:50:54 sd-53420 sshd\[15645\]: User root from 194.184.198.62 not allowed because none of user's groups are listed in AllowGroups Mar 18 18:50:54 sd-53420 sshd\[15645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.184.198.62 user=root Mar 18 18:50:57 sd-53420 sshd\[15645\]: Failed password for invalid user root from 194.184.198.62 port 51593 ssh2 Mar 18 18:55:28 sd-53420 sshd\[17170\]: Invalid user alok from 194.184.198.62 Mar 18 18:55:28 sd-53420 sshd\[17170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.184.198.62 ... |
2020-03-19 03:04:55 |
| 31.14.142.162 | attackspambots | Mar 18 19:32:25 ns3042688 sshd\[15578\]: Invalid user cpanelphpmyadmin from 31.14.142.162 Mar 18 19:32:25 ns3042688 sshd\[15578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.14.142.162 Mar 18 19:32:27 ns3042688 sshd\[15578\]: Failed password for invalid user cpanelphpmyadmin from 31.14.142.162 port 39403 ssh2 Mar 18 19:36:38 ns3042688 sshd\[15939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.14.142.162 user=root Mar 18 19:36:40 ns3042688 sshd\[15939\]: Failed password for root from 31.14.142.162 port 49656 ssh2 ... |
2020-03-19 03:01:01 |
| 107.13.107.67 | attackspambots | Honeypot attack, port: 5555, PTR: mta-107-13-107-67.nc.rr.com. |
2020-03-19 02:53:38 |
| 113.142.69.229 | attackspam | Mar 18 09:51:48 NPSTNNYC01T sshd[14359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.69.229 Mar 18 09:51:49 NPSTNNYC01T sshd[14359]: Failed password for invalid user samba from 113.142.69.229 port 48234 ssh2 Mar 18 09:53:48 NPSTNNYC01T sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.142.69.229 ... |
2020-03-19 02:56:16 |
| 145.255.31.52 | attackspam | Mar 18 18:03:57 ns382633 sshd\[28942\]: Invalid user robertparker from 145.255.31.52 port 46597 Mar 18 18:03:57 ns382633 sshd\[28942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.255.31.52 Mar 18 18:03:59 ns382633 sshd\[28942\]: Failed password for invalid user robertparker from 145.255.31.52 port 46597 ssh2 Mar 18 18:24:50 ns382633 sshd\[3711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.255.31.52 user=root Mar 18 18:24:52 ns382633 sshd\[3711\]: Failed password for root from 145.255.31.52 port 38938 ssh2 |
2020-03-19 03:12:41 |
| 193.37.255.114 | attack | " " |
2020-03-19 02:36:39 |
| 222.186.30.187 | attack | Mar 18 15:50:32 firewall sshd[7738]: Failed password for root from 222.186.30.187 port 63863 ssh2 Mar 18 15:50:35 firewall sshd[7738]: Failed password for root from 222.186.30.187 port 63863 ssh2 Mar 18 15:50:37 firewall sshd[7738]: Failed password for root from 222.186.30.187 port 63863 ssh2 ... |
2020-03-19 02:55:02 |