City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.34.242.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.34.242.78. IN A
;; AUTHORITY SECTION:
. 493 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 17:32:48 CST 2022
;; MSG SIZE rcvd: 106
Host 78.242.34.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 78.242.34.149.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.71.63.130 | attackspambots | Excessive Port-Scanning |
2020-09-06 06:30:42 |
| 185.220.103.6 | attackbotsspam | $lgm |
2020-09-06 06:39:35 |
| 222.186.169.192 | attackbotsspam | Sep 6 00:34:12 PorscheCustomer sshd[2143]: Failed password for root from 222.186.169.192 port 57766 ssh2 Sep 6 00:34:24 PorscheCustomer sshd[2143]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 57766 ssh2 [preauth] Sep 6 00:34:31 PorscheCustomer sshd[2161]: Failed password for root from 222.186.169.192 port 4118 ssh2 ... |
2020-09-06 06:47:46 |
| 163.142.240.46 | attack | Port probing on unauthorized port 23 |
2020-09-06 06:55:59 |
| 192.35.169.23 | attack |
|
2020-09-06 06:30:59 |
| 51.75.64.187 | attackbotsspam | 2020-09-05T22:05:59+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-09-06 06:38:23 |
| 84.17.47.82 | attackspam | (From atrixxtrix@gmail.com) Dear Sir/mdm, How are you? We supply Professional surveillance & medical products: Moldex, makrite and 3M N95 1870, 1860, 9502, 9501, 8210, 9105 3ply medical, KN95, FFP2, FFP3, PPDS masks Face shield/medical goggles Nitrile/vinyl/Latex/PP gloves Isolation/surgical gown lvl1-4 Protective PPE/Overalls lvl1-4 IR non-contact/oral thermometers sanitizer dispenser Logitech/OEM webcam Marine underwater CCTV Explosionproof CCTV 4G Solar CCTV Human body thermal cameras IP & analog cameras for homes/industrial/commercial Let us know which products you are interested and we can send you our full pricelist. We also welcome distributors/resellers. Our CCTV cameras are made in Taiwan. Our ip camera system is plug and play without any configuration (just scan QR code on mobile phone) and our cameras do not require any standalone power supply to work. Feel free to contact us below Whatsapp: +65 87695655 Telegram: cctv_hub Skype: cc |
2020-09-06 06:27:56 |
| 180.76.186.54 | attackbots | firewall-block, port(s): 10300/tcp |
2020-09-06 06:32:17 |
| 152.32.202.198 | attackspambots | Sep 5 13:35:20 ny01 sshd[17828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.202.198 Sep 5 13:35:22 ny01 sshd[17828]: Failed password for invalid user teamspeak from 152.32.202.198 port 41330 ssh2 Sep 5 13:38:11 ny01 sshd[18159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.202.198 |
2020-09-06 06:37:13 |
| 194.61.24.102 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-09-06 06:43:45 |
| 104.244.79.241 | attackspambots | (sshd) Failed SSH login from 104.244.79.241 (LU/Luxembourg/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 5 17:44:12 server2 sshd[13186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.241 user=root Sep 5 17:44:14 server2 sshd[13186]: Failed password for root from 104.244.79.241 port 45566 ssh2 Sep 5 17:44:15 server2 sshd[13186]: Failed password for root from 104.244.79.241 port 45566 ssh2 Sep 5 17:44:18 server2 sshd[13186]: Failed password for root from 104.244.79.241 port 45566 ssh2 Sep 5 17:44:20 server2 sshd[13186]: Failed password for root from 104.244.79.241 port 45566 ssh2 |
2020-09-06 06:41:07 |
| 213.141.131.22 | attack | Sep 5 15:01:41 ws24vmsma01 sshd[79280]: Failed password for root from 213.141.131.22 port 53024 ssh2 ... |
2020-09-06 06:28:41 |
| 185.214.164.6 | attackspambots | 20 attempts against mh-misbehave-ban on oak |
2020-09-06 06:49:50 |
| 107.189.11.160 | attackspambots | Sep 6 00:20:15 OPSO sshd\[12015\]: Invalid user vagrant from 107.189.11.160 port 55320 Sep 6 00:20:15 OPSO sshd\[12021\]: Invalid user test from 107.189.11.160 port 55324 Sep 6 00:20:15 OPSO sshd\[12018\]: Invalid user centos from 107.189.11.160 port 55318 Sep 6 00:20:15 OPSO sshd\[12019\]: Invalid user postgres from 107.189.11.160 port 55322 Sep 6 00:20:15 OPSO sshd\[12020\]: Invalid user oracle from 107.189.11.160 port 55326 Sep 6 00:20:15 OPSO sshd\[12017\]: Invalid user ubuntu from 107.189.11.160 port 55316 |
2020-09-06 06:25:52 |
| 112.202.3.55 | attackspambots | 1599324634 - 09/05/2020 18:50:34 Host: 112.202.3.55/112.202.3.55 Port: 445 TCP Blocked |
2020-09-06 06:18:47 |