City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.137.121.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.137.121.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 22:39:53 CST 2025
;; MSG SIZE rcvd: 107
Host 42.121.137.146.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.121.137.146.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
222.186.169.192 | attackbotsspam | $f2bV_matches |
2019-09-25 13:40:38 |
104.168.199.40 | attackbots | 2019-09-25T08:34:23.727140tmaserv sshd\[29745\]: Invalid user th from 104.168.199.40 port 56052 2019-09-25T08:34:23.730126tmaserv sshd\[29745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-479602.hostwindsdns.com 2019-09-25T08:34:26.252830tmaserv sshd\[29745\]: Failed password for invalid user th from 104.168.199.40 port 56052 ssh2 2019-09-25T08:40:34.321775tmaserv sshd\[30040\]: Invalid user racquel from 104.168.199.40 port 40712 2019-09-25T08:40:34.325323tmaserv sshd\[30040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-479602.hostwindsdns.com 2019-09-25T08:40:36.447510tmaserv sshd\[30040\]: Failed password for invalid user racquel from 104.168.199.40 port 40712 ssh2 ... |
2019-09-25 13:42:53 |
185.17.149.163 | attack | Admin Joomla Attack |
2019-09-25 13:24:01 |
159.203.201.235 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-09-25 13:13:50 |
112.29.140.223 | attack | 3389BruteforceFW22 |
2019-09-25 14:01:56 |
192.95.23.128 | attackspambots | Automatic report - Banned IP Access |
2019-09-25 13:06:38 |
122.176.27.149 | attackbotsspam | *Port Scan* detected from 122.176.27.149 (IN/India/abts-north-static-149.27.176.122.airtelbroadband.in). 4 hits in the last 70 seconds |
2019-09-25 13:20:24 |
176.31.162.82 | attack | Sep 24 19:27:33 web1 sshd\[8314\]: Invalid user performer from 176.31.162.82 Sep 24 19:27:33 web1 sshd\[8314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82 Sep 24 19:27:35 web1 sshd\[8314\]: Failed password for invalid user performer from 176.31.162.82 port 40718 ssh2 Sep 24 19:31:31 web1 sshd\[8709\]: Invalid user sui from 176.31.162.82 Sep 24 19:31:31 web1 sshd\[8709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82 |
2019-09-25 13:55:17 |
142.44.160.214 | attackbots | 2019-09-25T12:24:24.266832enmeeting.mahidol.ac.th sshd\[19004\]: Invalid user wetserver from 142.44.160.214 port 45252 2019-09-25T12:24:24.285405enmeeting.mahidol.ac.th sshd\[19004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net 2019-09-25T12:24:26.523729enmeeting.mahidol.ac.th sshd\[19004\]: Failed password for invalid user wetserver from 142.44.160.214 port 45252 ssh2 ... |
2019-09-25 13:40:13 |
93.115.150.236 | attackspambots | 2019-09-25T05:29:05.059909abusebot-8.cloudsearch.cf sshd\[25961\]: Invalid user trendimsa1.0 from 93.115.150.236 port 55718 |
2019-09-25 13:51:24 |
195.154.108.194 | attack | Sep 25 00:26:05 plusreed sshd[25819]: Invalid user flower from 195.154.108.194 ... |
2019-09-25 13:15:29 |
151.80.27.32 | attack | Port Scan: TCP/42766 |
2019-09-25 13:18:12 |
219.93.16.183 | attackbots | Unauthorized IMAP connection attempt |
2019-09-25 13:54:30 |
58.244.216.237 | attack | Unauthorised access (Sep 25) SRC=58.244.216.237 LEN=40 TTL=49 ID=2985 TCP DPT=8080 WINDOW=3497 SYN |
2019-09-25 13:41:47 |
49.88.112.85 | attackbotsspam | Sep 25 00:04:15 debian sshd[18983]: Unable to negotiate with 49.88.112.85 port 61011: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] Sep 25 01:21:18 debian sshd[22887]: Unable to negotiate with 49.88.112.85 port 55064: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2019-09-25 13:22:41 |