City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.57.213.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.57.213.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:00:31 CST 2025
;; MSG SIZE rcvd: 107
Host 142.213.57.192.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.213.57.192.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 36.189.253.226 | attack | Jun 14 08:59:57 nas sshd[4825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.253.226 Jun 14 08:59:59 nas sshd[4825]: Failed password for invalid user tester from 36.189.253.226 port 35554 ssh2 Jun 14 09:08:08 nas sshd[5165]: Failed password for root from 36.189.253.226 port 39300 ssh2 ... |
2020-06-14 16:35:58 |
| 129.211.185.246 | attackbotsspam | SSH invalid-user multiple login try |
2020-06-14 16:30:33 |
| 188.131.173.220 | attackbots | Jun 14 05:40:36 django-0 sshd\[18487\]: Failed password for root from 188.131.173.220 port 48588 ssh2Jun 14 05:47:30 django-0 sshd\[18671\]: Invalid user skynet from 188.131.173.220Jun 14 05:47:32 django-0 sshd\[18671\]: Failed password for invalid user skynet from 188.131.173.220 port 39064 ssh2 ... |
2020-06-14 16:24:23 |
| 119.237.10.208 | attack | Port probing on unauthorized port 5555 |
2020-06-14 17:03:18 |
| 112.85.42.195 | attackbotsspam | none |
2020-06-14 16:40:10 |
| 134.175.111.215 | attackspambots | Jun 13 19:59:38 tdfoods sshd\[6257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 user=root Jun 13 19:59:41 tdfoods sshd\[6257\]: Failed password for root from 134.175.111.215 port 48538 ssh2 Jun 13 20:04:37 tdfoods sshd\[6615\]: Invalid user wuryanto from 134.175.111.215 Jun 13 20:04:37 tdfoods sshd\[6615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 Jun 13 20:04:39 tdfoods sshd\[6615\]: Failed password for invalid user wuryanto from 134.175.111.215 port 33386 ssh2 |
2020-06-14 16:44:18 |
| 192.3.15.100 | attackspam | " " |
2020-06-14 16:38:25 |
| 193.112.143.141 | attackbotsspam | Jun 14 08:20:08 pkdns2 sshd\[12321\]: Failed password for root from 193.112.143.141 port 36396 ssh2Jun 14 08:23:51 pkdns2 sshd\[12467\]: Invalid user dpl from 193.112.143.141Jun 14 08:23:53 pkdns2 sshd\[12467\]: Failed password for invalid user dpl from 193.112.143.141 port 40896 ssh2Jun 14 08:27:37 pkdns2 sshd\[12668\]: Invalid user pengrenhuan from 193.112.143.141Jun 14 08:27:38 pkdns2 sshd\[12668\]: Failed password for invalid user pengrenhuan from 193.112.143.141 port 45398 ssh2Jun 14 08:29:31 pkdns2 sshd\[12753\]: Invalid user bookings from 193.112.143.141 ... |
2020-06-14 16:28:35 |
| 5.196.197.77 | attack | Jun 14 07:12:54 vmd48417 sshd[16064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.197.77 |
2020-06-14 17:07:28 |
| 217.182.206.211 | attack | 217.182.206.211 - - [14/Jun/2020:11:56:19 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-06-14 16:23:25 |
| 149.202.4.243 | attack | Jun 14 06:15:56 meumeu sshd[459382]: Invalid user matt from 149.202.4.243 port 49170 Jun 14 06:15:56 meumeu sshd[459382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.4.243 Jun 14 06:15:56 meumeu sshd[459382]: Invalid user matt from 149.202.4.243 port 49170 Jun 14 06:15:59 meumeu sshd[459382]: Failed password for invalid user matt from 149.202.4.243 port 49170 ssh2 Jun 14 06:17:49 meumeu sshd[461330]: Invalid user elizabet from 149.202.4.243 port 45020 Jun 14 06:17:49 meumeu sshd[461330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.4.243 Jun 14 06:17:49 meumeu sshd[461330]: Invalid user elizabet from 149.202.4.243 port 45020 Jun 14 06:17:51 meumeu sshd[461330]: Failed password for invalid user elizabet from 149.202.4.243 port 45020 ssh2 Jun 14 06:19:38 meumeu sshd[461454]: Invalid user 1q2w3e4r from 149.202.4.243 port 40680 ... |
2020-06-14 16:26:50 |
| 162.243.138.141 | attackbotsspam | IP 162.243.138.141 attacked honeypot on port: 512 at 6/14/2020 9:18:17 AM |
2020-06-14 16:52:40 |
| 106.13.59.224 | attack | (sshd) Failed SSH login from 106.13.59.224 (CN/China/-): 5 in the last 3600 secs |
2020-06-14 17:06:55 |
| 106.13.228.187 | attack | Invalid user caijiaohua from 106.13.228.187 port 57794 |
2020-06-14 17:00:58 |
| 119.18.155.82 | attack | Jun 14 10:42:48 cp sshd[18261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.18.155.82 |
2020-06-14 17:02:12 |