City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.114.42.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.114.42.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:23:01 CST 2025
;; MSG SIZE rcvd: 106
Host 136.42.114.16.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 136.42.114.16.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
54.36.126.81 | attackspam | Jul 30 02:51:32 pkdns2 sshd\[62427\]: Invalid user ranjit from 54.36.126.81Jul 30 02:51:34 pkdns2 sshd\[62427\]: Failed password for invalid user ranjit from 54.36.126.81 port 20578 ssh2Jul 30 02:55:39 pkdns2 sshd\[62630\]: Invalid user zd from 54.36.126.81Jul 30 02:55:41 pkdns2 sshd\[62630\]: Failed password for invalid user zd from 54.36.126.81 port 15504 ssh2Jul 30 02:59:55 pkdns2 sshd\[62770\]: Invalid user hz from 54.36.126.81Jul 30 02:59:57 pkdns2 sshd\[62770\]: Failed password for invalid user hz from 54.36.126.81 port 10420 ssh2 ... |
2019-07-30 08:03:38 |
103.133.107.48 | attackspam | Unauthorised access (Jul 29) SRC=103.133.107.48 LEN=40 TTL=244 ID=23289 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Jul 28) SRC=103.133.107.48 LEN=40 TTL=244 ID=57752 TCP DPT=3389 WINDOW=1024 SYN |
2019-07-30 08:35:08 |
218.75.132.59 | attackbots | Jul 29 18:38:28 vps200512 sshd\[13620\]: Invalid user hey from 218.75.132.59 Jul 29 18:38:28 vps200512 sshd\[13620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.132.59 Jul 29 18:38:29 vps200512 sshd\[13620\]: Failed password for invalid user hey from 218.75.132.59 port 55849 ssh2 Jul 29 18:48:14 vps200512 sshd\[13865\]: Invalid user hello112233 from 218.75.132.59 Jul 29 18:48:14 vps200512 sshd\[13865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.132.59 |
2019-07-30 08:39:48 |
201.93.81.227 | attackspam | Jul 29 17:26:52 aat-srv002 sshd[23203]: Failed password for root from 201.93.81.227 port 52749 ssh2 Jul 29 17:32:22 aat-srv002 sshd[23326]: Failed password for root from 201.93.81.227 port 50034 ssh2 Jul 29 17:37:49 aat-srv002 sshd[23491]: Failed password for root from 201.93.81.227 port 47301 ssh2 ... |
2019-07-30 08:36:43 |
192.236.146.185 | attackbotsspam | 2019-07-29 UTC: 1x - root |
2019-07-30 08:44:27 |
141.98.81.38 | attackspambots | Invalid user admin from 141.98.81.38 port 15470 |
2019-07-30 08:07:37 |
187.109.57.225 | attackbotsspam | Distributed brute force attack |
2019-07-30 08:13:51 |
34.87.101.250 | attackbots | [munged]::80 34.87.101.250 - - [29/Jul/2019:19:32:00 +0200] "POST /[munged]: HTTP/1.1" 200 2062 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::80 34.87.101.250 - - [29/Jul/2019:19:32:01 +0200] "POST /[munged]: HTTP/1.1" 200 2061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::80 34.87.101.250 - - [29/Jul/2019:19:32:03 +0200] "POST /[munged]: HTTP/1.1" 200 2056 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::80 34.87.101.250 - - [29/Jul/2019:19:32:04 +0200] "POST /[munged]: HTTP/1.1" 200 2060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::80 34.87.101.250 - - [29/Jul/2019:19:32:06 +0200] "POST /[munged]: HTTP/1.1" 200 2059 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::80 34.87.101.250 - - [29/Jul/2019:19:32:07 +0200] "POST /[munged]: HTTP/1.1" 200 2058 "-" "Mozilla/5.0 (X11; Ubuntu; Li |
2019-07-30 08:39:29 |
107.170.202.131 | attackbots | " " |
2019-07-30 08:14:40 |
188.93.108.154 | attackbots | [portscan] Port scan |
2019-07-30 08:40:53 |
95.52.29.92 | attack | 19/7/29@13:33:55: FAIL: IoT-SSH address from=95.52.29.92 19/7/29@13:33:56: FAIL: IoT-SSH address from=95.52.29.92 ... |
2019-07-30 07:58:01 |
178.128.104.252 | attackspambots | Invalid user admin from 178.128.104.252 port 40518 |
2019-07-30 08:03:19 |
158.69.112.95 | attackspam | Jul 30 00:34:45 mail sshd\[8187\]: Invalid user !pass123 from 158.69.112.95 Jul 30 00:34:45 mail sshd\[8187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95 Jul 30 00:34:47 mail sshd\[8187\]: Failed password for invalid user !pass123 from 158.69.112.95 port 57828 ssh2 ... |
2019-07-30 08:23:12 |
91.93.56.11 | attackbotsspam | Unauthorised access (Jul 29) SRC=91.93.56.11 LEN=40 TTL=51 ID=64087 TCP DPT=23 WINDOW=56531 SYN |
2019-07-30 08:23:54 |
122.13.2.171 | attack | Jul 29 19:33:31 tuxlinux sshd[31301]: Invalid user world from 122.13.2.171 port 43576 Jul 29 19:33:31 tuxlinux sshd[31301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.13.2.171 Jul 29 19:33:31 tuxlinux sshd[31301]: Invalid user world from 122.13.2.171 port 43576 Jul 29 19:33:31 tuxlinux sshd[31301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.13.2.171 Jul 29 19:33:31 tuxlinux sshd[31301]: Invalid user world from 122.13.2.171 port 43576 Jul 29 19:33:31 tuxlinux sshd[31301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.13.2.171 Jul 29 19:33:33 tuxlinux sshd[31301]: Failed password for invalid user world from 122.13.2.171 port 43576 ssh2 ... |
2019-07-30 08:06:03 |