City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.242.187.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.242.187.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:36:06 CST 2025
;; MSG SIZE rcvd: 107
b'Host 74.187.242.164.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 164.242.187.74.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.10.217.199 | attackspam | UTC: 2019-10-23 port: 23/tcp |
2019-10-24 19:03:48 |
| 118.96.172.161 | attackspam | Unauthorised access (Oct 24) SRC=118.96.172.161 LEN=52 TTL=247 ID=26435 DF TCP DPT=445 WINDOW=8192 SYN |
2019-10-24 19:11:34 |
| 37.59.107.100 | attackspambots | Oct 23 19:43:53 sachi sshd\[18887\]: Invalid user service from 37.59.107.100 Oct 23 19:43:53 sachi sshd\[18887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.ip-37-59-107.eu Oct 23 19:43:56 sachi sshd\[18887\]: Failed password for invalid user service from 37.59.107.100 port 35508 ssh2 Oct 23 19:47:44 sachi sshd\[19196\]: Invalid user abbey from 37.59.107.100 Oct 23 19:47:44 sachi sshd\[19196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.ip-37-59-107.eu |
2019-10-24 19:02:15 |
| 162.214.14.3 | attackspam | Invalid user admin from 162.214.14.3 port 47404 |
2019-10-24 19:05:49 |
| 54.39.147.2 | attack | Oct 23 19:21:30 hpm sshd\[14170\]: Invalid user g0df0r3v3rg from 54.39.147.2 Oct 23 19:21:30 hpm sshd\[14170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.ip-54-39-147.net Oct 23 19:21:33 hpm sshd\[14170\]: Failed password for invalid user g0df0r3v3rg from 54.39.147.2 port 49029 ssh2 Oct 23 19:25:43 hpm sshd\[14490\]: Invalid user 1234qwer from 54.39.147.2 Oct 23 19:25:43 hpm sshd\[14490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.ip-54-39-147.net |
2019-10-24 18:56:47 |
| 211.195.12.33 | attack | Oct 24 10:11:26 localhost sshd\[125741\]: Invalid user steam from 211.195.12.33 port 53936 Oct 24 10:11:26 localhost sshd\[125741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33 Oct 24 10:11:28 localhost sshd\[125741\]: Failed password for invalid user steam from 211.195.12.33 port 53936 ssh2 Oct 24 10:16:17 localhost sshd\[125891\]: Invalid user user8 from 211.195.12.33 port 45413 Oct 24 10:16:17 localhost sshd\[125891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33 ... |
2019-10-24 19:03:06 |
| 148.70.3.199 | attack | Oct 23 20:34:30 php1 sshd\[29829\]: Invalid user linode from 148.70.3.199 Oct 23 20:34:30 php1 sshd\[29829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199 Oct 23 20:34:33 php1 sshd\[29829\]: Failed password for invalid user linode from 148.70.3.199 port 48406 ssh2 Oct 23 20:41:04 php1 sshd\[30493\]: Invalid user dpisklo from 148.70.3.199 Oct 23 20:41:04 php1 sshd\[30493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199 |
2019-10-24 19:29:24 |
| 198.199.78.18 | attackspambots | WordPress login Brute force / Web App Attack on client site. |
2019-10-24 18:57:11 |
| 151.80.75.127 | attackbotsspam | Oct 24 13:03:50 mail postfix/smtpd[7047]: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 13:04:44 mail postfix/smtpd[6278]: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 24 13:04:49 mail postfix/smtpd[5399]: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-10-24 19:17:56 |
| 92.119.160.106 | attackbots | Oct 24 13:01:07 mc1 kernel: \[3201211.560315\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=48984 PROTO=TCP SPT=57053 DPT=28881 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 24 13:02:42 mc1 kernel: \[3201305.665377\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=6063 PROTO=TCP SPT=57053 DPT=29499 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 24 13:03:00 mc1 kernel: \[3201324.357795\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=60785 PROTO=TCP SPT=57053 DPT=28669 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-24 19:26:45 |
| 165.225.36.124 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-24 19:23:30 |
| 47.103.127.194 | attackspambots | Automatic report - Banned IP Access |
2019-10-24 19:05:20 |
| 185.209.0.91 | attack | 10/24/2019-12:37:24.312271 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-24 19:24:09 |
| 94.23.198.73 | attack | $f2bV_matches |
2019-10-24 18:57:42 |
| 51.77.147.51 | attackspambots | Oct 24 11:50:17 www sshd\[31530\]: Invalid user abrahamsen from 51.77.147.51 port 46116 ... |
2019-10-24 19:01:34 |