City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.26.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.4.26.106. IN A
;; AUTHORITY SECTION:
. 305 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:04:29 CST 2022
;; MSG SIZE rcvd: 105
106.26.4.142.in-addr.arpa domain name pointer server.amsamoa.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
106.26.4.142.in-addr.arpa name = server.amsamoa.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.234.9.150 | attackbotsspam | Sep 25 18:19:12 eddieflores sshd\[5132\]: Invalid user anca123 from 62.234.9.150 Sep 25 18:19:12 eddieflores sshd\[5132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.9.150 Sep 25 18:19:14 eddieflores sshd\[5132\]: Failed password for invalid user anca123 from 62.234.9.150 port 50806 ssh2 Sep 25 18:24:41 eddieflores sshd\[5509\]: Invalid user smurf from 62.234.9.150 Sep 25 18:24:41 eddieflores sshd\[5509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.9.150 |
2019-09-26 12:38:43 |
| 115.85.224.14 | attack | port scan and connect, tcp 80 (http) |
2019-09-26 12:21:28 |
| 5.196.12.2 | attackspambots | Automatic report - Banned IP Access |
2019-09-26 12:33:10 |
| 188.19.180.150 | attackbots | Telnet Server BruteForce Attack |
2019-09-26 12:50:29 |
| 14.48.82.202 | attack | port scan and connect, tcp 80 (http) |
2019-09-26 12:27:00 |
| 46.38.144.17 | attackspam | Sep 26 06:43:48 relay postfix/smtpd\[29191\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 26 06:44:06 relay postfix/smtpd\[19932\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 26 06:45:13 relay postfix/smtpd\[18581\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 26 06:45:31 relay postfix/smtpd\[19932\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 26 06:46:36 relay postfix/smtpd\[29191\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-26 12:49:42 |
| 193.31.24.113 | attackbotsspam | 09/26/2019-06:19:02.703625 193.31.24.113 Protocol: 6 SURICATA TLS invalid handshake message |
2019-09-26 12:29:08 |
| 39.66.224.95 | attackspambots | Unauthorised access (Sep 26) SRC=39.66.224.95 LEN=40 TTL=49 ID=53586 TCP DPT=8080 WINDOW=25343 SYN Unauthorised access (Sep 25) SRC=39.66.224.95 LEN=40 TTL=49 ID=4259 TCP DPT=8080 WINDOW=25343 SYN Unauthorised access (Sep 24) SRC=39.66.224.95 LEN=40 TTL=49 ID=32246 TCP DPT=8080 WINDOW=61534 SYN |
2019-09-26 12:32:05 |
| 185.117.215.9 | attackbotsspam | Sep 26 03:57:39 thevastnessof sshd[24081]: Failed password for root from 185.117.215.9 port 42430 ssh2 ... |
2019-09-26 12:41:03 |
| 111.230.183.115 | attack | (sshd) Failed SSH login from 111.230.183.115 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 25 23:56:56 host sshd[30336]: Invalid user seng from 111.230.183.115 port 38864 |
2019-09-26 12:54:18 |
| 46.148.151.16 | attack | port scan and connect, tcp 80 (http) |
2019-09-26 12:27:33 |
| 178.128.112.98 | attack | Sep 25 18:15:18 tdfoods sshd\[21616\]: Invalid user cmxi from 178.128.112.98 Sep 25 18:15:18 tdfoods sshd\[21616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.112.98 Sep 25 18:15:19 tdfoods sshd\[21616\]: Failed password for invalid user cmxi from 178.128.112.98 port 39407 ssh2 Sep 25 18:22:38 tdfoods sshd\[22164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.112.98 user=root Sep 25 18:22:41 tdfoods sshd\[22164\]: Failed password for root from 178.128.112.98 port 60628 ssh2 |
2019-09-26 12:39:27 |
| 221.195.240.162 | attackspam | Unauthorised access (Sep 26) SRC=221.195.240.162 LEN=40 TTL=49 ID=48071 TCP DPT=8080 WINDOW=21855 SYN Unauthorised access (Sep 26) SRC=221.195.240.162 LEN=40 TTL=49 ID=27906 TCP DPT=8080 WINDOW=21855 SYN Unauthorised access (Sep 25) SRC=221.195.240.162 LEN=40 TTL=49 ID=21671 TCP DPT=8080 WINDOW=440 SYN Unauthorised access (Sep 24) SRC=221.195.240.162 LEN=40 TTL=48 ID=29868 TCP DPT=8080 WINDOW=440 SYN |
2019-09-26 12:25:43 |
| 208.187.167.78 | attackbotsspam | Sent mail to target address hacked/leaked from abandonia in 2016 |
2019-09-26 12:59:47 |
| 200.89.174.229 | attackbots | 15,45-12/02 [bc01/m40] concatform PostRequest-Spammer scoring: rome |
2019-09-26 12:48:06 |