City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.42.129.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.42.129.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 08:02:19 CST 2025
;; MSG SIZE rcvd: 107
Host 214.129.42.168.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.129.42.168.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 80.20.125.243 | attack | Nov 17 16:37:23 MK-Soft-VM4 sshd[28828]: Failed password for root from 80.20.125.243 port 43735 ssh2 ... |
2019-11-18 04:54:18 |
| 68.183.193.46 | attack | Automatic report - Banned IP Access |
2019-11-18 04:58:01 |
| 199.19.224.191 | attackspam | Nov 17 19:22:21 internal-server-tf sshd\[2922\]: Invalid user test from 199.19.224.191Nov 17 19:22:21 internal-server-tf sshd\[2920\]: Invalid user guest from 199.19.224.191Nov 17 19:22:21 internal-server-tf sshd\[2911\]: Invalid user hadoop from 199.19.224.191 ... |
2019-11-18 04:56:57 |
| 101.99.80.99 | attackspam | Nov 17 18:36:24 SilenceServices sshd[21831]: Failed password for root from 101.99.80.99 port 17982 ssh2 Nov 17 18:42:19 SilenceServices sshd[23639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.99.80.99 Nov 17 18:42:21 SilenceServices sshd[23639]: Failed password for invalid user magdeburg from 101.99.80.99 port 29074 ssh2 |
2019-11-18 04:25:34 |
| 50.93.249.242 | attackspambots | Nov 17 15:29:36 TORMINT sshd\[13738\]: Invalid user zidane from 50.93.249.242 Nov 17 15:29:36 TORMINT sshd\[13738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.93.249.242 Nov 17 15:29:38 TORMINT sshd\[13738\]: Failed password for invalid user zidane from 50.93.249.242 port 55136 ssh2 ... |
2019-11-18 04:40:56 |
| 92.112.18.131 | attackbots | Connection by 92.112.18.131 on port: 23 got caught by honeypot at 11/17/2019 1:38:09 PM |
2019-11-18 04:26:41 |
| 134.209.11.199 | attackspam | Brute-force attempt banned |
2019-11-18 04:26:24 |
| 222.83.218.117 | attack | Fail2Ban - FTP Abuse Attempt |
2019-11-18 04:34:45 |
| 206.167.33.12 | attack | Automatic report - Banned IP Access |
2019-11-18 04:35:31 |
| 45.178.23.1 | attackspam | port scan and connect, tcp 23 (telnet) |
2019-11-18 04:53:23 |
| 51.77.195.149 | attackspambots | Nov 17 17:28:00 server sshd\[31007\]: Invalid user cecile from 51.77.195.149 Nov 17 17:28:00 server sshd\[31007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.ip-51-77-195.eu Nov 17 17:28:02 server sshd\[31007\]: Failed password for invalid user cecile from 51.77.195.149 port 43640 ssh2 Nov 17 17:37:31 server sshd\[1066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.ip-51-77-195.eu user=root Nov 17 17:37:34 server sshd\[1066\]: Failed password for root from 51.77.195.149 port 33874 ssh2 ... |
2019-11-18 04:46:28 |
| 139.59.4.63 | attack | Nov 17 15:59:53 localhost sshd\[1047\]: Invalid user adfelipe from 139.59.4.63 port 57131 Nov 17 15:59:53 localhost sshd\[1047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.63 Nov 17 15:59:55 localhost sshd\[1047\]: Failed password for invalid user adfelipe from 139.59.4.63 port 57131 ssh2 Nov 17 16:04:16 localhost sshd\[1154\]: Invalid user yaakob from 139.59.4.63 port 47371 Nov 17 16:04:16 localhost sshd\[1154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.63 ... |
2019-11-18 04:42:04 |
| 222.186.175.169 | attackspam | Nov 17 21:26:17 dedicated sshd[16028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Nov 17 21:26:19 dedicated sshd[16028]: Failed password for root from 222.186.175.169 port 7728 ssh2 |
2019-11-18 04:34:12 |
| 46.32.230.38 | attackbotsspam | Wordpress bruteforce |
2019-11-18 04:33:44 |
| 200.52.19.152 | attackbotsspam | port 23 attempt blocked |
2019-11-18 04:28:42 |