City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.149.161.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54626
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.149.161.42. IN A
;; AUTHORITY SECTION:
. 234 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023061500 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 15 19:52:30 CST 2023
;; MSG SIZE rcvd: 106
Host 42.161.149.16.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.161.149.16.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.51.160.47 | attack | UTC: 2019-10-21 port: 70/tcp |
2019-10-22 12:00:38 |
| 146.0.75.203 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-10-22 07:51:30 |
| 151.42.246.138 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-22 07:53:34 |
| 206.189.143.219 | attackspambots | 2019-10-21T20:11:47.334708shield sshd\[1013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.143.219 user=root 2019-10-21T20:11:49.890289shield sshd\[1013\]: Failed password for root from 206.189.143.219 port 50594 ssh2 2019-10-21T20:16:20.872508shield sshd\[1861\]: Invalid user dirk from 206.189.143.219 port 34398 2019-10-21T20:16:20.876824shield sshd\[1861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.143.219 2019-10-21T20:16:23.241942shield sshd\[1861\]: Failed password for invalid user dirk from 206.189.143.219 port 34398 ssh2 |
2019-10-22 08:00:39 |
| 212.92.250.91 | attack | Invalid user postgres from 212.92.250.91 port 50486 |
2019-10-22 07:57:24 |
| 157.55.39.248 | attackspam | Automatic report - Banned IP Access |
2019-10-22 08:05:04 |
| 54.39.193.26 | attackbotsspam | Oct 21 23:54:43 ny01 sshd[10621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.193.26 Oct 21 23:54:45 ny01 sshd[10621]: Failed password for invalid user fawst from 54.39.193.26 port 38478 ssh2 Oct 21 23:58:25 ny01 sshd[11472]: Failed password for root from 54.39.193.26 port 31502 ssh2 |
2019-10-22 12:06:43 |
| 173.208.152.250 | attack | Unauthorised access (Oct 22) SRC=173.208.152.250 LEN=52 TTL=241 ID=4678 TCP DPT=1433 WINDOW=63443 SYN |
2019-10-22 12:00:03 |
| 94.177.213.167 | attackspambots | Oct 22 05:51:03 ns381471 sshd[21750]: Failed password for root from 94.177.213.167 port 59726 ssh2 Oct 22 05:54:49 ns381471 sshd[21875]: Failed password for root from 94.177.213.167 port 42082 ssh2 |
2019-10-22 12:02:57 |
| 95.181.132.140 | attack | Unauthorized connection attempt from IP address 95.181.132.140 on Port 445(SMB) |
2019-10-22 08:07:03 |
| 201.219.236.100 | attackspambots | 2019-10-21 x@x 2019-10-21 21:42:00 unexpected disconnection while reading SMTP command from ip-100-236-219-201.nextelmovil.cl [201.219.236.100]:28062 I=[10.100.18.22]:25 (error: Connection reset by peer) 2019-10-21 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=201.219.236.100 |
2019-10-22 07:51:04 |
| 222.186.180.17 | attackspambots | k+ssh-bruteforce |
2019-10-22 12:11:20 |
| 156.238.167.62 | attackspambots | Oct 21 16:20:39 ACSRAD auth.info sshd[21471]: Failed password for r.r from 156.238.167.62 port 58100 ssh2 Oct 21 16:20:39 ACSRAD auth.info sshd[21471]: Received disconnect from 156.238.167.62 port 58100:11: Bye Bye [preauth] Oct 21 16:20:39 ACSRAD auth.info sshd[21471]: Disconnected from 156.238.167.62 port 58100 [preauth] Oct 21 16:20:40 ACSRAD auth.notice sshguard[15662]: Attack from "156.238.167.62" on service 100 whostnameh danger 10. Oct 21 16:20:40 ACSRAD auth.notice sshguard[15662]: Attack from "156.238.167.62" on service 100 whostnameh danger 10. Oct 21 16:26:10 ACSRAD auth.info sshd[24557]: Invalid user save from 156.238.167.62 port 42822 Oct 21 16:26:10 ACSRAD auth.info sshd[24557]: Failed password for invalid user save from 156.238.167.62 port 42822 ssh2 Oct 21 16:26:11 ACSRAD auth.info sshd[24557]: Received disconnect from 156.238.167.62 port 42822:11: Bye Bye [preauth] Oct 21 16:26:11 ACSRAD auth.info sshd[24557]: Disconnected from 156.238.167.62 port 42822 ........ ------------------------------ |
2019-10-22 08:10:52 |
| 188.81.139.133 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/188.81.139.133/ PT - 1H : (7) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PT NAME ASN : ASN3243 IP : 188.81.139.133 CIDR : 188.80.0.0/14 PREFIX COUNT : 14 UNIQUE IP COUNT : 1704960 ATTACKS DETECTED ASN3243 : 1H - 1 3H - 1 6H - 1 12H - 2 24H - 2 DateTime : 2019-10-21 22:02:05 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-22 08:09:44 |
| 49.235.92.208 | attack | Oct 21 20:02:06 venus sshd\[8810\]: Invalid user hejiong from 49.235.92.208 port 35880 Oct 21 20:02:06 venus sshd\[8810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208 Oct 21 20:02:09 venus sshd\[8810\]: Failed password for invalid user hejiong from 49.235.92.208 port 35880 ssh2 ... |
2019-10-22 08:07:50 |