City: Durham
Region: North Carolina
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.215.142.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.215.142.205. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121501 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 06:14:19 CST 2024
;; MSG SIZE rcvd: 108
205.142.215.168.in-addr.arpa domain name pointer 168-215-142-205.static.ctl.one.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
205.142.215.168.in-addr.arpa name = 168-215-142-205.static.ctl.one.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.133.147.8 | attackspam | $f2bV_matches |
2020-09-13 18:28:49 |
| 201.211.185.43 | attack | 1599929428 - 09/12/2020 18:50:28 Host: 201.211.185.43/201.211.185.43 Port: 445 TCP Blocked |
2020-09-13 18:45:15 |
| 192.241.220.199 | attackbotsspam | port scan and connect, tcp 27017 (mongodb) |
2020-09-13 18:26:03 |
| 65.49.223.231 | attackspambots | $f2bV_matches |
2020-09-13 18:50:30 |
| 129.227.129.174 | attackbotsspam | TCP ports : 902 / 3527 / 7199 / 8884; UDP ports : 3478 / 32767 |
2020-09-13 18:56:22 |
| 200.133.39.84 | attackbots | 200.133.39.84 (BR/Brazil/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 04:14:14 server4 sshd[26169]: Failed password for root from 60.224.81.70 port 46230 ssh2 Sep 13 04:14:49 server4 sshd[26769]: Failed password for root from 200.133.39.84 port 42160 ssh2 Sep 13 04:14:25 server4 sshd[26677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.12.90 user=root Sep 13 04:14:26 server4 sshd[26677]: Failed password for root from 152.67.12.90 port 47870 ssh2 Sep 13 04:14:13 server4 sshd[26169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.224.81.70 user=root Sep 13 04:13:42 server4 sshd[26280]: Failed password for root from 168.232.198.218 port 55148 ssh2 IP Addresses Blocked: 60.224.81.70 (AU/Australia/-) |
2020-09-13 18:22:39 |
| 159.65.176.156 | attack | Sep 13 04:10:08 cho sshd[2794533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.176.156 Sep 13 04:10:08 cho sshd[2794533]: Invalid user avanthi from 159.65.176.156 port 58606 Sep 13 04:10:10 cho sshd[2794533]: Failed password for invalid user avanthi from 159.65.176.156 port 58606 ssh2 Sep 13 04:13:50 cho sshd[2794666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.176.156 user=root Sep 13 04:13:52 cho sshd[2794666]: Failed password for root from 159.65.176.156 port 35908 ssh2 ... |
2020-09-13 18:47:44 |
| 191.240.113.160 | attackbots | Sep 13 07:34:00 mail.srvfarm.net postfix/smtpd[977838]: warning: unknown[191.240.113.160]: SASL PLAIN authentication failed: Sep 13 07:34:00 mail.srvfarm.net postfix/smtpd[977838]: lost connection after AUTH from unknown[191.240.113.160] Sep 13 07:36:37 mail.srvfarm.net postfix/smtps/smtpd[982834]: warning: unknown[191.240.113.160]: SASL PLAIN authentication failed: Sep 13 07:36:38 mail.srvfarm.net postfix/smtps/smtpd[982834]: lost connection after AUTH from unknown[191.240.113.160] Sep 13 07:39:52 mail.srvfarm.net postfix/smtps/smtpd[982831]: warning: unknown[191.240.113.160]: SASL PLAIN authentication failed: |
2020-09-13 18:21:35 |
| 218.75.210.46 | attack | Sep 13 11:40:21 jane sshd[32654]: Failed password for root from 218.75.210.46 port 3419 ssh2 ... |
2020-09-13 18:36:21 |
| 151.80.77.132 | attackspam | 20 attempts against mh-ssh on sand |
2020-09-13 18:54:52 |
| 139.59.36.87 | attack | $f2bV_matches |
2020-09-13 18:41:34 |
| 134.209.233.225 | attack | Sep 13 12:45:19 host1 sshd[252428]: Failed password for root from 134.209.233.225 port 37544 ssh2 Sep 13 12:49:00 host1 sshd[252628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.233.225 user=root Sep 13 12:49:02 host1 sshd[252628]: Failed password for root from 134.209.233.225 port 52452 ssh2 Sep 13 12:52:47 host1 sshd[252905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.233.225 user=root Sep 13 12:52:49 host1 sshd[252905]: Failed password for root from 134.209.233.225 port 39128 ssh2 ... |
2020-09-13 18:55:19 |
| 112.85.42.87 | attack | Sep 13 02:14:29 ip-172-31-42-142 sshd\[18184\]: Failed password for root from 112.85.42.87 port 30402 ssh2\ Sep 13 02:15:32 ip-172-31-42-142 sshd\[18200\]: Failed password for root from 112.85.42.87 port 14526 ssh2\ Sep 13 02:16:32 ip-172-31-42-142 sshd\[18202\]: Failed password for root from 112.85.42.87 port 46523 ssh2\ Sep 13 02:17:33 ip-172-31-42-142 sshd\[18231\]: Failed password for root from 112.85.42.87 port 26723 ssh2\ Sep 13 02:18:34 ip-172-31-42-142 sshd\[18235\]: Failed password for root from 112.85.42.87 port 64718 ssh2\ |
2020-09-13 18:53:46 |
| 192.35.169.16 | attackbotsspam | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-09-13 18:35:10 |
| 159.65.30.66 | attackbots | Sep 13 08:09:09 IngegnereFirenze sshd[14623]: User root from 159.65.30.66 not allowed because not listed in AllowUsers ... |
2020-09-13 18:30:32 |