City: unknown
Region: unknown
Country: Egypt
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.42.207.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.42.207.2. IN A
;; AUTHORITY SECTION:
. 157 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:58:32 CST 2022
;; MSG SIZE rcvd: 105
2.207.42.197.in-addr.arpa domain name pointer host-197.42.207.2.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.207.42.197.in-addr.arpa name = host-197.42.207.2.tedata.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.219.0.29 | attackspam | 2019-11-09T05:52:34.314404lon01.zurich-datacenter.net sshd\[3074\]: Invalid user user from 139.219.0.29 port 44340 2019-11-09T05:52:34.320033lon01.zurich-datacenter.net sshd\[3074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.29 2019-11-09T05:52:36.415524lon01.zurich-datacenter.net sshd\[3074\]: Failed password for invalid user user from 139.219.0.29 port 44340 ssh2 2019-11-09T05:57:17.094478lon01.zurich-datacenter.net sshd\[3150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.29 user=root 2019-11-09T05:57:19.375474lon01.zurich-datacenter.net sshd\[3150\]: Failed password for root from 139.219.0.29 port 53476 ssh2 ... |
2019-11-09 13:08:51 |
| 181.221.192.113 | attack | 2019-11-07T19:41:07.142457www.arvenenaske.de sshd[1102600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113 user=r.r 2019-11-07T19:41:08.535422www.arvenenaske.de sshd[1102600]: Failed password for r.r from 181.221.192.113 port 60410 ssh2 2019-11-07T19:45:37.320152www.arvenenaske.de sshd[1102651]: Invalid user nextcloud from 181.221.192.113 port 51622 2019-11-07T19:45:37.325203www.arvenenaske.de sshd[1102651]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113 user=nextcloud 2019-11-07T19:45:37.325806www.arvenenaske.de sshd[1102651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113 2019-11-07T19:45:37.320152www.arvenenaske.de sshd[1102651]: Invalid user nextcloud from 181.221.192.113 port 51622 2019-11-07T19:45:39.120009www.arvenenaske.de sshd[1102651]: Failed password for invalid user nextcloud from 181.221.19........ ------------------------------ |
2019-11-09 09:00:38 |
| 202.98.203.29 | attackspambots | Unauthorised access (Nov 9) SRC=202.98.203.29 LEN=40 PREC=0x20 TTL=231 ID=58510 TCP DPT=1433 WINDOW=1024 SYN |
2019-11-09 13:21:11 |
| 35.194.140.24 | attackbots | Nov 9 05:55:57 MK-Soft-VM4 sshd[16005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.140.24 Nov 9 05:55:59 MK-Soft-VM4 sshd[16005]: Failed password for invalid user 12 from 35.194.140.24 port 42464 ssh2 ... |
2019-11-09 13:03:59 |
| 190.2.116.26 | attack | Nov 4 00:12:08 ovpn sshd[24382]: Invalid user nfsnobody from 190.2.116.26 Nov 4 00:12:08 ovpn sshd[24382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.2.116.26 Nov 4 00:12:11 ovpn sshd[24382]: Failed password for invalid user nfsnobody from 190.2.116.26 port 38038 ssh2 Nov 4 00:12:11 ovpn sshd[24382]: Received disconnect from 190.2.116.26 port 38038:11: Bye Bye [preauth] Nov 4 00:12:11 ovpn sshd[24382]: Disconnected from 190.2.116.26 port 38038 [preauth] Nov 4 00:37:01 ovpn sshd[11569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.2.116.26 user=r.r Nov 4 00:37:03 ovpn sshd[11569]: Failed password for r.r from 190.2.116.26 port 60914 ssh2 Nov 4 00:37:03 ovpn sshd[11569]: Received disconnect from 190.2.116.26 port 60914:11: Bye Bye [preauth] Nov 4 00:37:03 ovpn sshd[11569]: Disconnected from 190.2.116.26 port 60914 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/e |
2019-11-09 13:11:21 |
| 222.186.173.180 | attack | Nov 9 06:11:34 h2177944 sshd\[13302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Nov 9 06:11:36 h2177944 sshd\[13302\]: Failed password for root from 222.186.173.180 port 44666 ssh2 Nov 9 06:11:40 h2177944 sshd\[13302\]: Failed password for root from 222.186.173.180 port 44666 ssh2 Nov 9 06:11:44 h2177944 sshd\[13302\]: Failed password for root from 222.186.173.180 port 44666 ssh2 ... |
2019-11-09 13:17:47 |
| 207.154.239.128 | attack | 2019-11-09T04:55:36.435188abusebot-8.cloudsearch.cf sshd\[10793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128 user=root |
2019-11-09 13:20:45 |
| 159.203.201.120 | attack | scan z |
2019-11-09 08:57:26 |
| 167.71.8.70 | attackbots | Nov 8 18:48:35 web9 sshd\[15398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.8.70 user=root Nov 8 18:48:37 web9 sshd\[15398\]: Failed password for root from 167.71.8.70 port 34830 ssh2 Nov 8 18:52:13 web9 sshd\[15830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.8.70 user=root Nov 8 18:52:16 web9 sshd\[15830\]: Failed password for root from 167.71.8.70 port 44802 ssh2 Nov 8 18:55:47 web9 sshd\[16254\]: Invalid user professor from 167.71.8.70 |
2019-11-09 13:12:54 |
| 222.97.226.58 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-09 13:02:24 |
| 138.68.50.18 | attack | Nov 9 05:55:58 lnxmysql61 sshd[12753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.50.18 |
2019-11-09 13:04:56 |
| 45.227.253.141 | attackspambots | Nov 8 20:00:17 web1 postfix/smtpd[380]: warning: unknown[45.227.253.141]: SASL LOGIN authentication failed: authentication failure ... |
2019-11-09 09:01:39 |
| 77.232.128.87 | attack | Nov 8 23:29:27 amit sshd\[7416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.128.87 user=root Nov 8 23:29:29 amit sshd\[7416\]: Failed password for root from 77.232.128.87 port 58132 ssh2 Nov 8 23:33:01 amit sshd\[27062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.128.87 user=root ... |
2019-11-09 09:06:42 |
| 27.254.130.69 | attackspambots | 2019-11-09T04:55:50.701620abusebot-8.cloudsearch.cf sshd\[10798\]: Invalid user pceriotti from 27.254.130.69 port 41975 |
2019-11-09 13:09:36 |
| 40.122.168.223 | attack | Repeated brute force against a port |
2019-11-09 08:57:07 |