City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.94.127.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.94.127.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 05:28:59 CST 2025
;; MSG SIZE rcvd: 106
Host 44.127.94.168.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.127.94.168.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
158.69.241.207 | attackspam | \[2019-10-16 10:36:46\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-16T10:36:46.017-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441923937030",SessionID="0x7fc3ad578188",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.241.207/53434",ACLName="no_extension_match" \[2019-10-16 10:38:41\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-16T10:38:41.826-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441923937030",SessionID="0x7fc3ac86e708",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.241.207/56865",ACLName="no_extension_match" \[2019-10-16 10:40:34\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-16T10:40:34.159-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="009441923937030",SessionID="0x7fc3ac999078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.241.207/58478",ACLName="no |
2019-10-16 22:58:21 |
45.142.195.5 | attackspam | Oct 16 16:19:32 webserver postfix/smtpd\[15864\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 16:19:52 webserver postfix/smtpd\[15864\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 16:20:38 webserver postfix/smtpd\[15864\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 16:21:25 webserver postfix/smtpd\[15863\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 16:22:13 webserver postfix/smtpd\[15863\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-10-16 22:28:16 |
54.184.218.147 | attackspambots | Bad bot/spoofed identity |
2019-10-16 22:40:07 |
92.222.47.41 | attack | Oct 16 16:03:58 ArkNodeAT sshd\[3163\]: Invalid user apayne from 92.222.47.41 Oct 16 16:03:58 ArkNodeAT sshd\[3163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.47.41 Oct 16 16:04:00 ArkNodeAT sshd\[3163\]: Failed password for invalid user apayne from 92.222.47.41 port 34830 ssh2 |
2019-10-16 22:52:35 |
104.236.63.99 | attackbotsspam | Oct 16 15:44:11 MK-Soft-Root2 sshd[7901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99 Oct 16 15:44:13 MK-Soft-Root2 sshd[7901]: Failed password for invalid user aknine from 104.236.63.99 port 34602 ssh2 ... |
2019-10-16 22:35:29 |
188.113.155.98 | attackbotsspam | [portscan] Port scan |
2019-10-16 23:11:15 |
218.18.101.84 | attackbots | Oct 16 03:28:36 auw2 sshd\[10160\]: Invalid user nimda from 218.18.101.84 Oct 16 03:28:36 auw2 sshd\[10160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.101.84 Oct 16 03:28:38 auw2 sshd\[10160\]: Failed password for invalid user nimda from 218.18.101.84 port 55488 ssh2 Oct 16 03:34:43 auw2 sshd\[10673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.101.84 user=mysql Oct 16 03:34:45 auw2 sshd\[10673\]: Failed password for mysql from 218.18.101.84 port 36790 ssh2 |
2019-10-16 23:00:36 |
193.32.160.144 | attackspambots | Oct 16 16:12:33 relay postfix/smtpd\[10681\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.144\]: 554 5.7.1 \ |
2019-10-16 22:49:47 |
118.71.253.20 | attackbots | Oct 16 05:20:59 mail postfix/postscreen[125324]: PREGREET 33 after 0.52 from [118.71.253.20]:42602: EHLO ip-address-pool-xxx.fpt.vn ... |
2019-10-16 22:41:50 |
92.50.249.166 | attack | Oct 16 16:24:52 MK-Soft-VM6 sshd[17728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166 Oct 16 16:24:54 MK-Soft-VM6 sshd[17728]: Failed password for invalid user aiyaz from 92.50.249.166 port 49810 ssh2 ... |
2019-10-16 22:29:16 |
85.209.0.194 | attackspambots | Scanning for open ports |
2019-10-16 22:31:20 |
184.105.139.97 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-16 22:53:34 |
184.105.247.202 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-16 23:00:54 |
54.38.188.34 | attackbots | Oct 16 08:17:09 firewall sshd[21083]: Invalid user ubnt from 54.38.188.34 Oct 16 08:17:11 firewall sshd[21083]: Failed password for invalid user ubnt from 54.38.188.34 port 56618 ssh2 Oct 16 08:21:04 firewall sshd[21171]: Invalid user lao from 54.38.188.34 ... |
2019-10-16 22:39:46 |
171.6.81.56 | attackbotsspam | fail2ban |
2019-10-16 22:57:29 |