City: Lithonia
Region: Georgia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.199.20.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;167.199.20.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024122800 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 28 21:28:33 CST 2024
;; MSG SIZE rcvd: 106
Host 42.20.199.167.in-addr.arpa not found: 2(SERVFAIL)
server can't find 167.199.20.42.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.175.215 | attackspam | Apr 2 00:43:57 minden010 sshd[6831]: Failed password for root from 222.186.175.215 port 4314 ssh2 Apr 2 00:44:06 minden010 sshd[6831]: Failed password for root from 222.186.175.215 port 4314 ssh2 Apr 2 00:44:10 minden010 sshd[6831]: Failed password for root from 222.186.175.215 port 4314 ssh2 Apr 2 00:44:10 minden010 sshd[6831]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 4314 ssh2 [preauth] ... |
2020-04-02 06:44:30 |
| 89.248.160.150 | attackspambots | 89.248.160.150 was recorded 25 times by 12 hosts attempting to connect to the following ports: 34567,30301,36693,28068. Incident counter (4h, 24h, all-time): 25, 135, 9527 |
2020-04-02 06:37:52 |
| 61.163.78.132 | attackspambots | fail2ban |
2020-04-02 06:11:42 |
| 106.12.76.91 | attackspam | Invalid user br from 106.12.76.91 port 56610 |
2020-04-02 06:11:07 |
| 41.95.192.127 | attack | Invalid user iup from 41.95.192.127 port 36948 |
2020-04-02 06:20:32 |
| 67.205.138.198 | attackbots | Apr 2 00:08:43 lukav-desktop sshd\[32248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.198 user=root Apr 2 00:08:45 lukav-desktop sshd\[32248\]: Failed password for root from 67.205.138.198 port 38692 ssh2 Apr 2 00:15:15 lukav-desktop sshd\[15647\]: Invalid user deployer from 67.205.138.198 Apr 2 00:15:15 lukav-desktop sshd\[15647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.198 Apr 2 00:15:17 lukav-desktop sshd\[15647\]: Failed password for invalid user deployer from 67.205.138.198 port 49444 ssh2 |
2020-04-02 06:05:00 |
| 89.248.169.12 | attackspam | firewall-block, port(s): 5672/tcp |
2020-04-02 06:36:07 |
| 36.89.163.178 | attackbots | SASL PLAIN auth failed: ruser=... |
2020-04-02 06:14:42 |
| 41.191.237.157 | attackbotsspam | Apr 2 04:09:35 itv-usvr-01 sshd[16745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.191.237.157 user=root Apr 2 04:09:37 itv-usvr-01 sshd[16745]: Failed password for root from 41.191.237.157 port 35940 ssh2 Apr 2 04:14:56 itv-usvr-01 sshd[16972]: Invalid user zhujing from 41.191.237.157 Apr 2 04:14:56 itv-usvr-01 sshd[16972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.191.237.157 Apr 2 04:14:56 itv-usvr-01 sshd[16972]: Invalid user zhujing from 41.191.237.157 Apr 2 04:14:57 itv-usvr-01 sshd[16972]: Failed password for invalid user zhujing from 41.191.237.157 port 43192 ssh2 |
2020-04-02 06:23:30 |
| 14.29.182.232 | attackspambots | Apr 1 23:11:08 minden010 sshd[30159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.182.232 Apr 1 23:11:10 minden010 sshd[30159]: Failed password for invalid user hv from 14.29.182.232 port 54117 ssh2 Apr 1 23:15:08 minden010 sshd[31744]: Failed password for root from 14.29.182.232 port 46257 ssh2 ... |
2020-04-02 06:14:58 |
| 58.208.196.207 | attack | (sshd) Failed SSH login from 58.208.196.207 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 2 00:07:18 srv sshd[6732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.208.196.207 user=root Apr 2 00:07:20 srv sshd[6732]: Failed password for root from 58.208.196.207 port 58594 ssh2 Apr 2 00:16:48 srv sshd[7357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.208.196.207 user=root Apr 2 00:16:50 srv sshd[7357]: Failed password for root from 58.208.196.207 port 36290 ssh2 Apr 2 00:53:14 srv sshd[8222]: Invalid user user from 58.208.196.207 port 37250 |
2020-04-02 06:12:39 |
| 153.127.14.47 | attackbotsspam | Invalid user wells from 153.127.14.47 port 35340 |
2020-04-02 06:13:17 |
| 220.167.166.21 | attackbotsspam | Unauthorized connection attempt from IP address 220.167.166.21 on Port 445(SMB) |
2020-04-02 06:11:20 |
| 104.248.131.234 | attackspambots | Port probing on unauthorized port 5038 |
2020-04-02 06:29:28 |
| 205.205.150.5 | attackbotsspam | Automatic report - Banned IP Access |
2020-04-02 06:43:16 |