City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.8.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.4.8.1. IN A
;; AUTHORITY SECTION:
. 596 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:35:56 CST 2022
;; MSG SIZE rcvd: 102
1.8.4.142.in-addr.arpa domain name pointer server.cnkusa.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.8.4.142.in-addr.arpa name = server.cnkusa.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
103.72.163.180 | attackspam | LGS,WP GET /wp-login.php GET /wp-login.php |
2019-07-23 22:14:54 |
131.100.132.14 | attack | Jul 23 05:15:41 web1 postfix/smtpd[3656]: warning: 131-100-132-14.radiobrastelecom.com.br[131.100.132.14]: SASL PLAIN authentication failed: authentication failure ... |
2019-07-23 22:11:53 |
218.253.193.2 | attackspam | Invalid user ding from 218.253.193.2 port 45974 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.193.2 Failed password for invalid user ding from 218.253.193.2 port 45974 ssh2 Invalid user jerome from 218.253.193.2 port 41704 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.193.2 |
2019-07-23 22:44:03 |
88.35.102.54 | attackbots | 2019-07-23T15:45:08.156664cavecanem sshd[27073]: Invalid user danilo from 88.35.102.54 port 39834 2019-07-23T15:45:08.160496cavecanem sshd[27073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.35.102.54 2019-07-23T15:45:08.156664cavecanem sshd[27073]: Invalid user danilo from 88.35.102.54 port 39834 2019-07-23T15:45:10.191109cavecanem sshd[27073]: Failed password for invalid user danilo from 88.35.102.54 port 39834 ssh2 2019-07-23T15:49:19.172188cavecanem sshd[32481]: Invalid user wz from 88.35.102.54 port 59844 2019-07-23T15:49:19.174583cavecanem sshd[32481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.35.102.54 2019-07-23T15:49:19.172188cavecanem sshd[32481]: Invalid user wz from 88.35.102.54 port 59844 2019-07-23T15:49:20.663163cavecanem sshd[32481]: Failed password for invalid user wz from 88.35.102.54 port 59844 ssh2 2019-07-23T15:53:42.403592cavecanem sshd[6287]: Invalid user thiago from 8 ... |
2019-07-23 22:17:08 |
96.27.124.162 | attackbotsspam | 96.27.124.162:36918 - - [21/Jul/2019:18:58:44 +0200] "GET /wp-login.php HTTP/1.1" 404 294 |
2019-07-23 22:34:50 |
107.172.94.162 | attackspambots | port scan and connect, tcp 9999 (abyss) |
2019-07-23 23:14:42 |
81.22.45.148 | attackspambots | 23.07.2019 14:21:09 Connection to port 9764 blocked by firewall |
2019-07-23 22:41:16 |
218.92.0.174 | attack | SSH-bruteforce attempts |
2019-07-23 22:16:00 |
189.91.7.131 | attackbots | Jul 23 05:15:35 web1 postfix/smtpd[3656]: warning: unknown[189.91.7.131]: SASL PLAIN authentication failed: authentication failure ... |
2019-07-23 22:15:29 |
62.210.9.67 | attack | WordPress wp-login brute force :: 62.210.9.67 0.056 BYPASS [23/Jul/2019:19:48:50 1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-07-23 23:16:27 |
185.199.8.69 | attack | This IP address was blacklisted for the following reason: /de/jobs/kfz-mechatroniker-m-w-d-kfz-mechaniker-m-w-d/&%20or%20(1,2)=(select*from(select%20name_const(CHAR(121,108,122,108,110,74,84,121,100),1),name_const(CHAR(121,108,122,108,110,74,84,121,100),1))a)%20--%20and%201%3D1 @ 2019-03-07T12:08:37+01:00. |
2019-07-23 22:43:06 |
43.240.10.27 | attackspambots | $f2bV_matches |
2019-07-23 22:18:59 |
103.10.30.224 | attackspam | Jul 23 13:57:08 localhost sshd\[838\]: Invalid user teamspeak3 from 103.10.30.224 port 52788 Jul 23 13:57:08 localhost sshd\[838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.224 ... |
2019-07-23 22:16:42 |
157.230.33.207 | attack | Jul 23 15:47:28 giegler sshd[17416]: Invalid user germain from 157.230.33.207 port 47248 |
2019-07-23 23:20:44 |
168.205.108.151 | attack | failed_logins |
2019-07-23 22:10:11 |