City: unknown
Region: unknown
Country: Malaysia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.142.204.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12271
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;175.142.204.102. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:42:26 CST 2025
;; MSG SIZE rcvd: 108
Host 102.204.142.175.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 102.204.142.175.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 80.82.64.73 | attack | Oct 19 05:54:05 mail kernel: [1170487.205042] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=33012 PROTO=TCP SPT=54202 DPT=42929 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 05:54:15 mail kernel: [1170496.580104] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=9883 PROTO=TCP SPT=54202 DPT=42380 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 05:55:10 mail kernel: [1170552.413123] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=51709 PROTO=TCP SPT=54202 DPT=42527 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 05:55:14 mail kernel: [1170555.595227] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=16262 PROTO=TCP SPT=54202 DPT=42421 WINDOW=1024 RES=0x00 SYN URGP=0 O |
2019-10-19 12:05:01 |
| 122.160.46.223 | attack | Automatic report - Port Scan Attack |
2019-10-19 07:48:16 |
| 200.57.253.209 | attack | Automatic report - Port Scan Attack |
2019-10-19 07:46:13 |
| 124.109.62.38 | attack | Oct 19 03:58:30 thevastnessof sshd[22116]: Failed password for root from 124.109.62.38 port 57685 ssh2 ... |
2019-10-19 12:18:13 |
| 81.22.45.190 | attack | 10/19/2019-05:58:53.040132 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-19 12:05:57 |
| 202.84.33.211 | attackspambots | Fail2Ban Ban Triggered |
2019-10-19 12:17:15 |
| 1.179.220.208 | attackspam | Automatic report - SSH Brute-Force Attack |
2019-10-19 07:52:57 |
| 88.249.252.134 | attackspam | Automatic report - Port Scan Attack |
2019-10-19 12:08:35 |
| 2.136.131.36 | attackspambots | Oct 19 02:57:19 microserver sshd[47082]: Invalid user valefor from 2.136.131.36 port 51644 Oct 19 02:57:19 microserver sshd[47082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.136.131.36 Oct 19 02:57:22 microserver sshd[47082]: Failed password for invalid user valefor from 2.136.131.36 port 51644 ssh2 Oct 19 03:00:49 microserver sshd[47662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.136.131.36 user=root Oct 19 03:00:51 microserver sshd[47662]: Failed password for root from 2.136.131.36 port 34036 ssh2 Oct 19 03:11:17 microserver sshd[49061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.136.131.36 user=root Oct 19 03:11:19 microserver sshd[49061]: Failed password for root from 2.136.131.36 port 37578 ssh2 Oct 19 03:15:00 microserver sshd[49275]: Invalid user ubuntu from 2.136.131.36 port 48174 Oct 19 03:15:00 microserver sshd[49275]: pam_unix(sshd:auth): authentication fa |
2019-10-19 07:38:51 |
| 59.14.18.60 | attackspam | firewall-block, port(s): 9001/tcp |
2019-10-19 07:47:13 |
| 222.186.180.8 | attackspambots | Triggered by Fail2Ban at Ares web server |
2019-10-19 07:44:35 |
| 89.248.160.193 | attack | 10/18/2019-18:31:14.515475 89.248.160.193 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-19 07:53:29 |
| 182.61.179.75 | attackbots | Oct 18 09:38:51 kapalua sshd\[22655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75 user=root Oct 18 09:38:52 kapalua sshd\[22655\]: Failed password for root from 182.61.179.75 port 20824 ssh2 Oct 18 09:43:20 kapalua sshd\[23203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75 user=root Oct 18 09:43:23 kapalua sshd\[23203\]: Failed password for root from 182.61.179.75 port 60966 ssh2 Oct 18 09:47:53 kapalua sshd\[23608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75 user=root |
2019-10-19 07:45:39 |
| 14.18.189.68 | attack | Triggered by Fail2Ban at Vostok web server |
2019-10-19 07:49:55 |
| 106.12.89.190 | attackspam | Oct 19 05:54:25 meumeu sshd[8673]: Failed password for root from 106.12.89.190 port 28633 ssh2 Oct 19 05:58:56 meumeu sshd[9267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.190 Oct 19 05:58:58 meumeu sshd[9267]: Failed password for invalid user zumbusch from 106.12.89.190 port 10714 ssh2 ... |
2019-10-19 12:02:47 |