City: unknown
Region: unknown
Country: Namibia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.242.16.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.242.16.121. IN A
;; AUTHORITY SECTION:
. 132 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022072800 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 28 21:20:41 CST 2022
;; MSG SIZE rcvd: 107
Host 121.16.242.160.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 121.16.242.160.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
1.170.2.100 | attackspambots | 1582520133 - 02/24/2020 05:55:33 Host: 1.170.2.100/1.170.2.100 Port: 445 TCP Blocked |
2020-02-24 14:49:02 |
222.186.15.166 | attackspam | none |
2020-02-24 14:44:49 |
171.228.153.167 | attackbots | Unauthorized connection attempt detected from IP address 171.228.153.167 to port 445 |
2020-02-24 14:56:13 |
222.252.62.78 | attackbots | 1582521345 - 02/24/2020 06:15:45 Host: 222.252.62.78/222.252.62.78 Port: 445 TCP Blocked |
2020-02-24 14:55:52 |
202.29.220.182 | attackspam | Invalid user root2 from 202.29.220.182 port 52458 |
2020-02-24 14:39:18 |
118.25.75.59 | attackspam | ssh brute force |
2020-02-24 14:47:28 |
54.200.182.16 | attack | 02/24/2020-07:15:31.082821 54.200.182.16 Protocol: 6 SURICATA TLS invalid record/traffic |
2020-02-24 14:46:00 |
222.186.42.136 | attackbots | Feb 24 07:26:19 MK-Soft-VM3 sshd[27819]: Failed password for root from 222.186.42.136 port 16920 ssh2 Feb 24 07:26:23 MK-Soft-VM3 sshd[27819]: Failed password for root from 222.186.42.136 port 16920 ssh2 ... |
2020-02-24 14:29:13 |
138.185.201.205 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-24 14:38:37 |
83.97.20.33 | attackspambots | Feb 24 07:31:46 debian-2gb-nbg1-2 kernel: \[4785107.634501\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.33 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=43038 DPT=6379 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-02-24 14:50:02 |
181.51.36.52 | attack | Feb 24 06:55:42 ncomp sshd[23695]: Invalid user pi from 181.51.36.52 Feb 24 06:55:42 ncomp sshd[23696]: Invalid user pi from 181.51.36.52 |
2020-02-24 14:47:00 |
223.71.167.165 | attackspam | 223.71.167.165 was recorded 27 times by 7 hosts attempting to connect to the following ports: 8200,9208,5601,199,10134,2222,16010,2121,7,2455,8085,9080,61613,10038,6001,3000,21,5060,9600,7548,55553,995,8008,1099,2401,3307,41794. Incident counter (4h, 24h, all-time): 27, 180, 6427 |
2020-02-24 14:34:57 |
132.148.129.180 | attackspambots | Invalid user www from 132.148.129.180 port 37252 |
2020-02-24 15:00:40 |
182.161.4.211 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 24-02-2020 04:55:20. |
2020-02-24 14:59:51 |
36.77.93.229 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 24-02-2020 04:55:24. |
2020-02-24 14:52:51 |