City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.42.146.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.42.146.201. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:12:28 CST 2025
;; MSG SIZE rcvd: 107
Host 201.146.42.149.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 201.146.42.149.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.248.168.176 | attackspam |
|
2020-05-25 03:43:29 |
| 51.83.42.66 | attackbots | 2020-05-24T21:05:55.622587ollin.zadara.org sshd[30482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.66 user=root 2020-05-24T21:05:57.233476ollin.zadara.org sshd[30482]: Failed password for root from 51.83.42.66 port 45021 ssh2 ... |
2020-05-25 03:34:42 |
| 54.172.117.167 | attack |
|
2020-05-25 03:31:28 |
| 193.53.163.208 | attackspambots | Automatic report - Port Scan Attack |
2020-05-25 03:46:30 |
| 107.158.163.137 | attackspambots | Spam |
2020-05-25 03:30:55 |
| 208.187.244.122 | attackspambots | Spam |
2020-05-25 03:25:23 |
| 185.182.62.103 | attackspam | Spam |
2020-05-25 03:28:14 |
| 70.98.79.33 | attackbots | Spam |
2020-05-25 03:22:03 |
| 47.92.160.127 | attack | WP brute force attack |
2020-05-25 03:58:03 |
| 98.100.250.202 | attackbotsspam | May 24 18:17:08 localhost sshd\[29535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.100.250.202 user=root May 24 18:17:10 localhost sshd\[29535\]: Failed password for root from 98.100.250.202 port 49524 ssh2 May 24 18:22:24 localhost sshd\[29639\]: Invalid user sjulstok from 98.100.250.202 port 41454 ... |
2020-05-25 03:45:08 |
| 69.94.145.125 | attackspam | Spam |
2020-05-25 03:22:35 |
| 49.233.88.25 | attackspam | SSH Brute Force |
2020-05-25 03:40:05 |
| 51.195.164.81 | attack | [Sun May 24 13:39:34 2020] - Syn Flood From IP: 51.195.164.81 Port: 59047 |
2020-05-25 03:39:11 |
| 167.71.146.220 | attackspam | Automatic report - Banned IP Access |
2020-05-25 03:43:42 |
| 142.44.242.68 | attack | May 24 14:43:33 ws19vmsma01 sshd[182390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.242.68 May 24 14:43:36 ws19vmsma01 sshd[182390]: Failed password for invalid user chek from 142.44.242.68 port 56676 ssh2 ... |
2020-05-25 03:57:20 |