City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.132.149.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.132.149.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:10:45 CST 2025
;; MSG SIZE rcvd: 107
Host 42.149.132.144.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.149.132.144.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.46.105.196 | attackspam | Automatic report - XMLRPC Attack |
2019-11-21 22:57:22 |
| 218.189.208.168 | attackspambots | Unauthorised access (Nov 21) SRC=218.189.208.168 LEN=40 TOS=0x04 TTL=242 ID=16866 TCP DPT=1433 WINDOW=1024 SYN |
2019-11-21 23:21:05 |
| 167.114.145.139 | attack | Nov 21 15:53:13 OPSO sshd\[1264\]: Invalid user water1 from 167.114.145.139 port 53422 Nov 21 15:53:13 OPSO sshd\[1264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.145.139 Nov 21 15:53:15 OPSO sshd\[1264\]: Failed password for invalid user water1 from 167.114.145.139 port 53422 ssh2 Nov 21 15:56:39 OPSO sshd\[1753\]: Invalid user ebenezer from 167.114.145.139 port 60576 Nov 21 15:56:39 OPSO sshd\[1753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.145.139 |
2019-11-21 23:02:50 |
| 71.217.8.27 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-21 22:53:51 |
| 183.82.118.172 | attackspambots | Unauthorized connection attempt from IP address 183.82.118.172 on Port 445(SMB) |
2019-11-21 22:48:11 |
| 198.108.67.104 | attackspam | 198.108.67.104 was recorded 5 times by 5 hosts attempting to connect to the following ports: 8037,2051,2376,2570,9991. Incident counter (4h, 24h, all-time): 5, 19, 243 |
2019-11-21 23:21:34 |
| 62.234.122.141 | attackspambots | Nov 21 11:50:18 firewall sshd[7370]: Invalid user hhhhhhh from 62.234.122.141 Nov 21 11:50:21 firewall sshd[7370]: Failed password for invalid user hhhhhhh from 62.234.122.141 port 44002 ssh2 Nov 21 11:56:07 firewall sshd[7472]: Invalid user xiao from 62.234.122.141 ... |
2019-11-21 23:26:33 |
| 134.209.223.214 | attackbots | Automatic report - Banned IP Access |
2019-11-21 23:23:08 |
| 167.71.226.158 | attackbotsspam | Nov 21 19:52:02 gw1 sshd[13210]: Failed password for root from 167.71.226.158 port 56280 ssh2 ... |
2019-11-21 23:31:11 |
| 118.169.35.69 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-21 22:54:32 |
| 27.254.63.38 | attack | SSH Brute Force |
2019-11-21 23:06:08 |
| 119.203.59.159 | attack | Nov 21 14:51:45 web8 sshd\[3150\]: Invalid user verkoopstate from 119.203.59.159 Nov 21 14:51:45 web8 sshd\[3150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.59.159 Nov 21 14:51:47 web8 sshd\[3150\]: Failed password for invalid user verkoopstate from 119.203.59.159 port 27763 ssh2 Nov 21 14:56:01 web8 sshd\[5140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.59.159 user=root Nov 21 14:56:02 web8 sshd\[5140\]: Failed password for root from 119.203.59.159 port 64129 ssh2 |
2019-11-21 23:30:44 |
| 165.227.84.119 | attack | Nov 21 14:52:19 hcbbdb sshd\[2308\]: Invalid user rolfarne from 165.227.84.119 Nov 21 14:52:19 hcbbdb sshd\[2308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.84.119 Nov 21 14:52:21 hcbbdb sshd\[2308\]: Failed password for invalid user rolfarne from 165.227.84.119 port 52994 ssh2 Nov 21 14:56:08 hcbbdb sshd\[2675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.84.119 user=root Nov 21 14:56:09 hcbbdb sshd\[2675\]: Failed password for root from 165.227.84.119 port 32860 ssh2 |
2019-11-21 23:24:45 |
| 116.108.13.49 | attack | Unauthorised access (Nov 21) SRC=116.108.13.49 LEN=52 TTL=111 ID=18979 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-21 23:25:31 |
| 139.155.83.98 | attackspam | Nov 21 16:12:23 vps666546 sshd\[9998\]: Invalid user manimozhi from 139.155.83.98 port 49694 Nov 21 16:12:23 vps666546 sshd\[9998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.83.98 Nov 21 16:12:25 vps666546 sshd\[9998\]: Failed password for invalid user manimozhi from 139.155.83.98 port 49694 ssh2 Nov 21 16:17:53 vps666546 sshd\[10233\]: Invalid user alex from 139.155.83.98 port 54606 Nov 21 16:17:53 vps666546 sshd\[10233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.83.98 ... |
2019-11-21 23:18:20 |