City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.68.129.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.68.129.42. IN A
;; AUTHORITY SECTION:
. 512 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400
;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 06:55:03 CST 2022
;; MSG SIZE rcvd: 106
Host 42.129.68.158.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.129.68.158.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
104.139.74.25 | attack | proto=tcp . spt=36114 . dpt=25 . Found on Blocklist de (505) |
2020-03-10 07:15:43 |
199.188.74.66 | attack | MYH,DEF GET /adminer.php GET /adminer.php GET /adminer.php GET /adminer.php |
2020-03-10 07:34:41 |
198.143.180.156 | attackbots | Dec 15 14:20:57 woltan sshd[17093]: Failed password for root from 198.143.180.156 port 58044 ssh2 |
2020-03-10 07:08:51 |
197.59.138.157 | attack | Sep 26 07:44:38 ms-srv sshd[21204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.59.138.157 Sep 26 07:44:40 ms-srv sshd[21204]: Failed password for invalid user admin from 197.59.138.157 port 42792 ssh2 |
2020-03-10 07:28:32 |
197.52.19.232 | attackspam | Jan 7 15:49:07 ms-srv sshd[45935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.52.19.232 Jan 7 15:49:09 ms-srv sshd[45935]: Failed password for invalid user admin from 197.52.19.232 port 41085 ssh2 |
2020-03-10 07:41:18 |
197.54.199.52 | attack | Dec 3 12:42:09 ms-srv sshd[56309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.54.199.52 Dec 3 12:42:12 ms-srv sshd[56309]: Failed password for invalid user admin from 197.54.199.52 port 64607 ssh2 |
2020-03-10 07:30:57 |
197.57.211.253 | attack | Feb 26 08:28:38 ms-srv sshd[45201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.57.211.253 Feb 26 08:28:41 ms-srv sshd[45201]: Failed password for invalid user admin from 197.57.211.253 port 34212 ssh2 |
2020-03-10 07:29:33 |
79.40.113.215 | attackspam | Automatic report - Port Scan Attack |
2020-03-10 07:26:41 |
198.181.37.245 | attackbotsspam | Feb 1 20:13:59 woltan sshd[21804]: Failed password for invalid user developer from 198.181.37.245 port 59698 ssh2 |
2020-03-10 07:02:47 |
122.139.253.252 | attack | Mar 9 22:12:32 [host] kernel: [418134.527780] [UF Mar 9 22:12:32 [host] kernel: [418134.528909] [UF Mar 9 22:12:32 [host] kernel: [418134.529815] [UF Mar 9 22:12:32 [host] kernel: [418134.529849] [UF Mar 9 22:12:32 [host] kernel: [418134.529870] [UF Mar 9 22:12:32 [host] kernel: [418134.529884] [UF Mar 9 22:12:32 [host] kernel: [418134.529955] [UF Mar 9 22:12:32 [host] kernel: [418134.530026] [UF Mar 9 22:12:32 [host] kernel: [418134.530135] [UF Mar 9 22:12:32 [host] kernel: [418134.530156] [UF |
2020-03-10 07:31:59 |
197.97.231.153 | attackbots | May 18 02:21:37 ms-srv sshd[55339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.97.231.153 May 18 02:21:39 ms-srv sshd[55339]: Failed password for invalid user testftp from 197.97.231.153 port 59754 ssh2 |
2020-03-10 07:18:28 |
197.62.95.179 | attackspam | Jan 2 06:01:38 ms-srv sshd[31572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.95.179 Jan 2 06:01:40 ms-srv sshd[31572]: Failed password for invalid user password from 197.62.95.179 port 58587 ssh2 |
2020-03-10 07:21:47 |
23.89.196.214 | attackbotsspam | MYH,DEF GET /adminer.php |
2020-03-10 07:39:07 |
217.23.74.198 | attack | Nov 24 23:51:13 woltan sshd[9598]: Failed password for invalid user pi from 217.23.74.198 port 53738 ssh2 Nov 24 23:51:13 woltan sshd[9600]: Failed password for invalid user pi from 217.23.74.198 port 53742 ssh2 |
2020-03-10 07:05:51 |
188.53.198.111 | attackbotsspam | Brute force attack against VPN service |
2020-03-10 07:13:06 |