City: unknown
Region: unknown
Country: Dominican Republic (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.101.171.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.101.171.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 16:50:13 CST 2025
;; MSG SIZE rcvd: 107
42.171.101.148.in-addr.arpa domain name pointer 42.171.101.148.l.static.claro.net.do.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.171.101.148.in-addr.arpa name = 42.171.101.148.l.static.claro.net.do.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
90.153.218.213 | attack | Fail2Ban Ban Triggered |
2020-02-09 22:53:48 |
185.143.223.161 | attackspambots | Feb 9 15:07:23 grey postfix/smtpd\[19654\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.161\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.161\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.161\]\; from=\ |
2020-02-09 23:03:02 |
185.175.93.34 | attack | 02/09/2020-14:50:29.819936 185.175.93.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-09 23:08:16 |
45.183.193.1 | attackbots | Feb 9 11:38:02 firewall sshd[21902]: Invalid user xzr from 45.183.193.1 Feb 9 11:38:05 firewall sshd[21902]: Failed password for invalid user xzr from 45.183.193.1 port 52808 ssh2 Feb 9 11:41:49 firewall sshd[22074]: Invalid user obf from 45.183.193.1 ... |
2020-02-09 23:07:31 |
194.26.29.129 | attackbotsspam | Feb 9 14:44:53 h2177944 kernel: \[4453924.861976\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=56258 PROTO=TCP SPT=40988 DPT=43643 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 14:44:53 h2177944 kernel: \[4453924.861991\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=56258 PROTO=TCP SPT=40988 DPT=43643 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 14:47:53 h2177944 kernel: \[4454105.466025\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=55612 PROTO=TCP SPT=40988 DPT=47447 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 14:47:53 h2177944 kernel: \[4454105.466041\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=55612 PROTO=TCP SPT=40988 DPT=47447 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 15:40:51 h2177944 kernel: \[4457282.641940\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.1 |
2020-02-09 23:11:32 |
113.23.4.141 | attackspambots | 1581255389 - 02/09/2020 14:36:29 Host: 113.23.4.141/113.23.4.141 Port: 445 TCP Blocked |
2020-02-09 23:02:19 |
87.98.229.196 | attack | [2020-02-09 10:04:54] NOTICE[1148][C-00007529] chan_sip.c: Call from '' (87.98.229.196:59452) to extension '146646812400385' rejected because extension not found in context 'public'. [2020-02-09 10:04:54] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-09T10:04:54.535-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="146646812400385",SessionID="0x7fd82c2348d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/87.98.229.196/59452",ACLName="no_extension_match" [2020-02-09 10:05:46] NOTICE[1148][C-0000752c] chan_sip.c: Call from '' (87.98.229.196:50444) to extension '209146812400385' rejected because extension not found in context 'public'. [2020-02-09 10:05:46] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-09T10:05:46.331-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="209146812400385",SessionID="0x7fd82cfcf5b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/ ... |
2020-02-09 23:17:55 |
139.228.240.54 | attack | Brute force attempt |
2020-02-09 23:20:58 |
80.211.45.85 | attackbots | Feb 9 14:36:18 tuxlinux sshd[43653]: Invalid user lcf from 80.211.45.85 port 59802 Feb 9 14:36:18 tuxlinux sshd[43653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.45.85 Feb 9 14:36:18 tuxlinux sshd[43653]: Invalid user lcf from 80.211.45.85 port 59802 Feb 9 14:36:18 tuxlinux sshd[43653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.45.85 Feb 9 14:36:18 tuxlinux sshd[43653]: Invalid user lcf from 80.211.45.85 port 59802 Feb 9 14:36:18 tuxlinux sshd[43653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.45.85 Feb 9 14:36:20 tuxlinux sshd[43653]: Failed password for invalid user lcf from 80.211.45.85 port 59802 ssh2 ... |
2020-02-09 23:14:11 |
222.186.30.76 | attackspambots | Feb 9 15:58:17 cvbnet sshd[18737]: Failed password for root from 222.186.30.76 port 59335 ssh2 Feb 9 15:58:19 cvbnet sshd[18737]: Failed password for root from 222.186.30.76 port 59335 ssh2 ... |
2020-02-09 22:59:22 |
170.83.69.132 | attackspambots | Brute force attempt |
2020-02-09 23:25:00 |
176.63.16.237 | attackspam | Brute force attempt |
2020-02-09 23:28:25 |
1.64.1.147 | attack | 23/tcp [2020-02-09]1pkt |
2020-02-09 23:00:54 |
103.197.72.254 | attackspam | Brute force attempt |
2020-02-09 23:38:00 |
114.143.230.186 | attackbotsspam | Brute force attempt |
2020-02-09 23:36:12 |