City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.239.100.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.239.100.49. IN A
;; AUTHORITY SECTION:
. 204 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120501 1800 900 604800 86400
;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 06 03:20:35 CST 2019
;; MSG SIZE rcvd: 118
Host 49.100.239.157.in-addr.arpa not found: 2(SERVFAIL)
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 49.100.239.157.in-addr.arpa.: No answer
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 187.174.219.142 | attack | detected by Fail2Ban |
2020-04-16 18:21:33 |
| 177.128.104.207 | attack | Apr 16 08:07:11 [host] sshd[14876]: Invalid user u Apr 16 08:07:11 [host] sshd[14876]: pam_unix(sshd: Apr 16 08:07:13 [host] sshd[14876]: Failed passwor |
2020-04-16 17:42:11 |
| 45.13.93.82 | attackspambots | Apr 16 11:16:35 debian-2gb-nbg1-2 kernel: \[9287576.693757\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.13.93.82 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=54321 PROTO=TCP SPT=34310 DPT=46189 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-04-16 17:53:38 |
| 134.209.248.218 | attack | " " |
2020-04-16 18:06:47 |
| 49.233.92.166 | attackspambots | $f2bV_matches |
2020-04-16 17:50:43 |
| 45.88.179.138 | attackbotsspam | SSH Scan |
2020-04-16 17:51:54 |
| 184.105.139.117 | attackspam | Apr 16 12:03:31 debian-2gb-nbg1-2 kernel: \[9290392.849005\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=184.105.139.117 DST=195.201.40.59 LEN=125 TOS=0x00 PREC=0x00 TTL=52 ID=43083 DF PROTO=UDP SPT=19929 DPT=1900 LEN=105 |
2020-04-16 18:18:08 |
| 62.215.6.11 | attackspambots | 2020-04-16T10:50:47.705213ns386461 sshd\[17814\]: Invalid user net from 62.215.6.11 port 35596 2020-04-16T10:50:47.710248ns386461 sshd\[17814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=out02-tec.fasttelco.net 2020-04-16T10:50:49.535048ns386461 sshd\[17814\]: Failed password for invalid user net from 62.215.6.11 port 35596 ssh2 2020-04-16T10:53:30.560645ns386461 sshd\[20326\]: Invalid user testman from 62.215.6.11 port 51410 2020-04-16T10:53:30.565123ns386461 sshd\[20326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=out02-tec.fasttelco.net ... |
2020-04-16 17:55:33 |
| 165.22.98.172 | attackspam | (From fernandes.magdalena@yahoo.com) Hi NEW Hydravid PRO is the next generation software program for fast video creation and syndication. What’s more, creating videos has never been easier than the drag and drop interface within this software. You can easily syndicate out to multiple accounts on the biggest video platforms in the world, with just one click or schedule them live on Facebook or YouTube. MORE INFO HERE=> https://bit.ly/2wDN8Kr Kind Regards, Magdalena Fernandes |
2020-04-16 17:46:52 |
| 128.199.99.204 | attack | 2020-04-15 UTC: (30x) - admin,b,bocloud,firefart,jake,localhost,mcUser,musicyxy,nisec,nmrsu,pdx,ppldtepe,root(16x),techuser,zxin10 |
2020-04-16 18:00:58 |
| 185.216.140.252 | attackspam | 04/16/2020-04:40:01.143873 185.216.140.252 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-16 17:56:06 |
| 80.211.45.85 | attackspambots | 2020-04-16T04:31:58.471213abusebot-4.cloudsearch.cf sshd[32531]: Invalid user rui from 80.211.45.85 port 56400 2020-04-16T04:31:58.478832abusebot-4.cloudsearch.cf sshd[32531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.45.85 2020-04-16T04:31:58.471213abusebot-4.cloudsearch.cf sshd[32531]: Invalid user rui from 80.211.45.85 port 56400 2020-04-16T04:32:00.777544abusebot-4.cloudsearch.cf sshd[32531]: Failed password for invalid user rui from 80.211.45.85 port 56400 ssh2 2020-04-16T04:36:47.804223abusebot-4.cloudsearch.cf sshd[363]: Invalid user client from 80.211.45.85 port 34804 2020-04-16T04:36:47.812894abusebot-4.cloudsearch.cf sshd[363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.45.85 2020-04-16T04:36:47.804223abusebot-4.cloudsearch.cf sshd[363]: Invalid user client from 80.211.45.85 port 34804 2020-04-16T04:36:49.785582abusebot-4.cloudsearch.cf sshd[363]: Failed password for inval ... |
2020-04-16 18:11:33 |
| 159.89.119.80 | attackspambots | firewall-block, port(s): 16954/tcp |
2020-04-16 17:40:08 |
| 81.177.72.58 | attack | Apr 16 09:06:19 master sshd[20696]: Failed password for invalid user developer from 81.177.72.58 port 53186 ssh2 Apr 16 10:08:45 master sshd[21136]: Failed password for invalid user deploy from 81.177.72.58 port 33054 ssh2 Apr 16 10:12:24 master sshd[21162]: Failed password for invalid user michal from 81.177.72.58 port 57734 ssh2 Apr 16 10:15:58 master sshd[21201]: Failed password for invalid user oracle from 81.177.72.58 port 54192 ssh2 Apr 16 10:19:35 master sshd[21226]: Failed password for invalid user admin from 81.177.72.58 port 50650 ssh2 Apr 16 10:23:09 master sshd[21248]: Failed password for invalid user anna from 81.177.72.58 port 47108 ssh2 Apr 16 10:26:53 master sshd[21272]: Failed password for invalid user angel from 81.177.72.58 port 43564 ssh2 Apr 16 10:35:48 master sshd[21341]: Failed password for invalid user deploy from 81.177.72.58 port 40044 ssh2 Apr 16 10:39:27 master sshd[21359]: Failed password for invalid user test from 81.177.72.58 port 36498 ssh2 |
2020-04-16 18:22:48 |
| 185.175.93.6 | attack | firewall-block, port(s): 3371/tcp |
2020-04-16 17:37:26 |