City: East Lansing
Region: Michigan
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.21.149.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.21.149.157. IN A
;; AUTHORITY SECTION:
. 121 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023102701 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 28 06:45:46 CST 2023
;; MSG SIZE rcvd: 107
Host 157.149.21.161.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 157.149.21.161.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
41.208.72.141 | attack | Invalid user User from 41.208.72.141 port 52720 |
2020-06-25 15:06:47 |
104.41.224.228 | attack | Jun 25 08:12:35 host sshd[17754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.41.224.228 user=root Jun 25 08:12:37 host sshd[17754]: Failed password for root from 104.41.224.228 port 5165 ssh2 ... |
2020-06-25 14:31:56 |
45.55.219.114 | attackspambots | $f2bV_matches |
2020-06-25 14:52:07 |
39.59.12.228 | attackspambots | IP 39.59.12.228 attacked honeypot on port: 8080 at 6/24/2020 8:54:06 PM |
2020-06-25 14:43:49 |
222.186.175.217 | attackbots | Jun 25 02:58:56 NPSTNNYC01T sshd[16803]: Failed password for root from 222.186.175.217 port 47504 ssh2 Jun 25 02:59:07 NPSTNNYC01T sshd[16803]: Failed password for root from 222.186.175.217 port 47504 ssh2 Jun 25 02:59:10 NPSTNNYC01T sshd[16803]: Failed password for root from 222.186.175.217 port 47504 ssh2 Jun 25 02:59:10 NPSTNNYC01T sshd[16803]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 47504 ssh2 [preauth] ... |
2020-06-25 15:00:41 |
45.6.98.133 | attackbots | 1593059980 - 06/25/2020 06:39:40 Host: 45.6.98.133/45.6.98.133 Port: 445 TCP Blocked |
2020-06-25 14:37:18 |
61.160.96.90 | attack | Jun 25 07:51:16 nextcloud sshd\[9711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.96.90 user=root Jun 25 07:51:18 nextcloud sshd\[9711\]: Failed password for root from 61.160.96.90 port 6114 ssh2 Jun 25 07:54:10 nextcloud sshd\[13149\]: Invalid user hanson from 61.160.96.90 Jun 25 07:54:10 nextcloud sshd\[13149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.96.90 |
2020-06-25 14:35:31 |
60.167.176.253 | attackbotsspam | SSH Brute-Force. Ports scanning. |
2020-06-25 14:57:42 |
54.38.139.210 | attackspam | Jun 24 23:04:41 dignus sshd[10866]: Failed password for invalid user test_user from 54.38.139.210 port 49094 ssh2 Jun 24 23:07:58 dignus sshd[11127]: Invalid user csgoserver from 54.38.139.210 port 47524 Jun 24 23:07:58 dignus sshd[11127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.139.210 Jun 24 23:08:00 dignus sshd[11127]: Failed password for invalid user csgoserver from 54.38.139.210 port 47524 ssh2 Jun 24 23:11:21 dignus sshd[11409]: Invalid user ftpuser from 54.38.139.210 port 45952 ... |
2020-06-25 14:47:33 |
91.134.173.100 | attack | Invalid user ajc from 91.134.173.100 port 49294 |
2020-06-25 14:57:14 |
13.72.51.193 | attack | ssh brute force |
2020-06-25 14:55:20 |
45.172.108.72 | attackspambots | Jun 25 06:41:04 h2779839 sshd[10749]: Invalid user admin from 45.172.108.72 port 57900 Jun 25 06:41:04 h2779839 sshd[10749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.108.72 Jun 25 06:41:04 h2779839 sshd[10749]: Invalid user admin from 45.172.108.72 port 57900 Jun 25 06:41:06 h2779839 sshd[10749]: Failed password for invalid user admin from 45.172.108.72 port 57900 ssh2 Jun 25 06:44:31 h2779839 sshd[10815]: Invalid user administrator from 45.172.108.72 port 48730 Jun 25 06:44:31 h2779839 sshd[10815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.108.72 Jun 25 06:44:31 h2779839 sshd[10815]: Invalid user administrator from 45.172.108.72 port 48730 Jun 25 06:44:33 h2779839 sshd[10815]: Failed password for invalid user administrator from 45.172.108.72 port 48730 ssh2 Jun 25 06:48:02 h2779839 sshd[10846]: Invalid user deploy from 45.172.108.72 port 39560 ... |
2020-06-25 14:47:55 |
168.63.245.27 | attack | Jun 24 18:25:19 Ubuntu-1404-trusty-64-minimal sshd\[7786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.63.245.27 user=root Jun 24 18:25:21 Ubuntu-1404-trusty-64-minimal sshd\[7786\]: Failed password for root from 168.63.245.27 port 47624 ssh2 Jun 25 05:51:57 Ubuntu-1404-trusty-64-minimal sshd\[8332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.63.245.27 user=root Jun 25 05:51:59 Ubuntu-1404-trusty-64-minimal sshd\[8332\]: Failed password for root from 168.63.245.27 port 7014 ssh2 Jun 25 06:44:57 Ubuntu-1404-trusty-64-minimal sshd\[5865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.63.245.27 user=root |
2020-06-25 14:27:00 |
222.186.180.41 | attackspambots | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-25 14:38:43 |
92.243.125.18 | attackbotsspam | Port probing on unauthorized port 445 |
2020-06-25 14:58:22 |