City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.59.242.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.59.242.230. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 17:29:47 CST 2025
;; MSG SIZE rcvd: 106
Host 230.242.59.18.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 230.242.59.18.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
118.24.213.107 | attackspambots | $f2bV_matches |
2019-11-09 02:56:38 |
89.46.125.39 | attackspam | 11/08/2019-15:35:30.213776 89.46.125.39 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 86 |
2019-11-09 02:56:07 |
39.89.251.161 | attackbotsspam | " " |
2019-11-09 02:54:43 |
177.38.182.92 | attack | Unauthorized connection attempt from IP address 177.38.182.92 on Port 445(SMB) |
2019-11-09 03:10:33 |
77.40.62.101 | attackspam | 2019-11-08T15:30:11.205068mail01 postfix/smtpd[9169]: warning: unknown[77.40.62.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-08T15:33:18.091609mail01 postfix/smtpd[30432]: warning: unknown[77.40.62.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-08T15:35:22.170548mail01 postfix/smtpd[23080]: warning: unknown[77.40.62.101]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-09 03:08:05 |
166.62.85.53 | attack | fail2ban honeypot |
2019-11-09 03:28:23 |
185.143.223.81 | attackbotsspam | Nov 8 19:21:44 h2177944 kernel: \[6112903.433191\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=51597 PROTO=TCP SPT=53588 DPT=49061 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 19:22:01 h2177944 kernel: \[6112920.383536\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=37457 PROTO=TCP SPT=53588 DPT=7124 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 19:26:35 h2177944 kernel: \[6113194.006230\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=15144 PROTO=TCP SPT=53588 DPT=21989 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 19:27:58 h2177944 kernel: \[6113276.863247\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=5036 PROTO=TCP SPT=53588 DPT=11781 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 8 19:32:11 h2177944 kernel: \[6113530.688147\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.21 |
2019-11-09 03:25:36 |
222.186.175.148 | attackspambots | Nov 8 20:16:37 MK-Soft-Root1 sshd[8063]: Failed password for root from 222.186.175.148 port 62728 ssh2 Nov 8 20:16:42 MK-Soft-Root1 sshd[8063]: Failed password for root from 222.186.175.148 port 62728 ssh2 ... |
2019-11-09 03:20:24 |
94.102.56.181 | attackbots | firewall-block, port(s): 6204/tcp, 6209/tcp, 6210/tcp |
2019-11-09 03:27:01 |
46.165.230.5 | attack | 11/08/2019-15:35:21.659372 46.165.230.5 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 67 |
2019-11-09 03:11:38 |
92.246.76.198 | attackspam | RDPBruteCAu |
2019-11-09 03:07:34 |
139.59.140.65 | attackbots | Nov 8 18:00:07 vpn01 sshd[11516]: Failed password for root from 139.59.140.65 port 52657 ssh2 ... |
2019-11-09 03:24:47 |
189.176.58.87 | attack | Unauthorised access (Nov 8) SRC=189.176.58.87 LEN=52 TTL=117 ID=17751 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-09 02:49:24 |
45.93.247.35 | attackbots | Postfix RBL failed |
2019-11-09 03:19:43 |
18.233.163.58 | attack | Port Scan: TCP/443 |
2019-11-09 02:53:18 |