City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.189.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.189.93. IN A
;; AUTHORITY SECTION:
. 280 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:44:31 CST 2022
;; MSG SIZE rcvd: 106
Host 93.189.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 93.189.93.142.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
180.183.97.214 | attackspambots | Fail2Ban Ban Triggered |
2020-08-02 22:29:56 |
190.13.80.218 | attackspambots | 1596370315 - 08/02/2020 14:11:55 Host: 190.13.80.218/190.13.80.218 Port: 445 TCP Blocked |
2020-08-02 22:20:57 |
129.204.2.171 | attackbots | Aug 2 17:07:05 gw1 sshd[9791]: Failed password for root from 129.204.2.171 port 43020 ssh2 ... |
2020-08-02 22:51:50 |
85.66.249.123 | attackspam | ssh intrusion attempt |
2020-08-02 22:38:41 |
37.120.179.189 | attackbotsspam | BURG,WP GET /wp-login.php |
2020-08-02 22:34:51 |
123.207.10.199 | attack | prod6 ... |
2020-08-02 22:54:19 |
41.205.42.75 | attackspam | TCP src-port=22515 dst-port=25 Listed on dnsbl-sorbs abuseat-org barracuda (Project Honey Pot rated Suspicious) (31) |
2020-08-02 22:29:16 |
198.52.125.205 | attackspambots | Aug 2 14:23:51 abendstille sshd\[7495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.52.125.205 user=root Aug 2 14:23:53 abendstille sshd\[7495\]: Failed password for root from 198.52.125.205 port 37730 ssh2 Aug 2 14:28:01 abendstille sshd\[11373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.52.125.205 user=root Aug 2 14:28:03 abendstille sshd\[11373\]: Failed password for root from 198.52.125.205 port 50644 ssh2 Aug 2 14:32:15 abendstille sshd\[15303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.52.125.205 user=root ... |
2020-08-02 22:36:54 |
51.254.37.192 | attackspambots | Aug 2 16:00:29 abendstille sshd\[1064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192 user=root Aug 2 16:00:31 abendstille sshd\[1064\]: Failed password for root from 51.254.37.192 port 52014 ssh2 Aug 2 16:04:35 abendstille sshd\[4694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192 user=root Aug 2 16:04:36 abendstille sshd\[4694\]: Failed password for root from 51.254.37.192 port 33304 ssh2 Aug 2 16:08:42 abendstille sshd\[8228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192 user=root ... |
2020-08-02 22:26:19 |
159.203.30.50 | attack | scans once in preceeding hours on the ports (in chronological order) 19137 resulting in total of 1 scans from 159.203.0.0/16 block. |
2020-08-02 22:46:37 |
157.230.2.208 | attackspambots | Aug 2 15:16:51 lukav-desktop sshd\[24002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 user=root Aug 2 15:16:53 lukav-desktop sshd\[24002\]: Failed password for root from 157.230.2.208 port 45452 ssh2 Aug 2 15:20:52 lukav-desktop sshd\[24026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 user=root Aug 2 15:20:53 lukav-desktop sshd\[24026\]: Failed password for root from 157.230.2.208 port 56060 ssh2 Aug 2 15:24:55 lukav-desktop sshd\[24063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 user=root |
2020-08-02 22:47:00 |
94.191.119.31 | attackspambots | fail2ban -- 94.191.119.31 ... |
2020-08-02 22:28:36 |
34.229.232.86 | attack | Scanner : /ResidentEvil/proxy |
2020-08-02 22:43:53 |
51.83.68.213 | attackspam | Aug 2 12:03:32 game-panel sshd[30533]: Failed password for root from 51.83.68.213 port 46426 ssh2 Aug 2 12:07:30 game-panel sshd[30672]: Failed password for root from 51.83.68.213 port 57462 ssh2 |
2020-08-02 22:39:07 |
159.65.30.66 | attackbotsspam | Aug 2 14:06:44 sip sshd[1168021]: Failed password for root from 159.65.30.66 port 52824 ssh2 Aug 2 14:11:28 sip sshd[1168067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66 user=root Aug 2 14:11:30 sip sshd[1168067]: Failed password for root from 159.65.30.66 port 37392 ssh2 ... |
2020-08-02 22:37:23 |