City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.61.95.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.61.95.42. IN A
;; AUTHORITY SECTION:
. 292 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 13:30:45 CST 2022
;; MSG SIZE rcvd: 105
42.95.61.197.in-addr.arpa domain name pointer host-197.61.95.42.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.95.61.197.in-addr.arpa name = host-197.61.95.42.tedata.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
118.174.184.102 | attackspambots | 20/6/7@23:54:12: FAIL: Alarm-Network address from=118.174.184.102 ... |
2020-06-08 13:44:00 |
61.142.20.46 | attackspambots | IP reached maximum auth failures |
2020-06-08 13:21:11 |
128.199.143.19 | attackbots | 2020-06-08T01:03:10.6931991495-001 sshd[54210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.143.19 user=root 2020-06-08T01:03:12.7219131495-001 sshd[54210]: Failed password for root from 128.199.143.19 port 52776 ssh2 2020-06-08T01:06:59.7637991495-001 sshd[54323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.143.19 user=root 2020-06-08T01:07:01.8977641495-001 sshd[54323]: Failed password for root from 128.199.143.19 port 55326 ssh2 2020-06-08T01:10:39.2150421495-001 sshd[54451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.143.19 user=root 2020-06-08T01:10:41.5498691495-001 sshd[54451]: Failed password for root from 128.199.143.19 port 57880 ssh2 ... |
2020-06-08 13:48:22 |
202.184.121.176 | attackspam | 9000/tcp [2020-06-08]1pkt |
2020-06-08 13:19:25 |
83.97.20.97 | attack | " " |
2020-06-08 13:47:39 |
91.207.175.154 | attack | 2020-06-07 09:40:53 Reject access to port(s):3306 1 times a day |
2020-06-08 13:47:20 |
110.137.37.32 | attackspambots | 445/tcp [2020-06-08]1pkt |
2020-06-08 13:20:27 |
180.76.179.43 | attackbots | Jun 8 02:00:49 firewall sshd[8973]: Failed password for root from 180.76.179.43 port 37170 ssh2 Jun 8 02:04:40 firewall sshd[9128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.179.43 user=root Jun 8 02:04:42 firewall sshd[9128]: Failed password for root from 180.76.179.43 port 59672 ssh2 ... |
2020-06-08 13:49:09 |
114.67.102.60 | attackspambots | Jun 8 07:47:19 piServer sshd[15738]: Failed password for root from 114.67.102.60 port 36587 ssh2 Jun 8 07:50:18 piServer sshd[16095]: Failed password for root from 114.67.102.60 port 55991 ssh2 ... |
2020-06-08 13:55:25 |
103.28.52.84 | attack | Jun 8 07:10:06 piServer sshd[12523]: Failed password for root from 103.28.52.84 port 43658 ssh2 Jun 8 07:12:47 piServer sshd[12696]: Failed password for root from 103.28.52.84 port 54526 ssh2 ... |
2020-06-08 13:39:06 |
163.47.106.107 | attackbots | Automatic report - XMLRPC Attack |
2020-06-08 13:22:30 |
183.17.229.99 | attackspam | 7008/tcp [2020-06-08]1pkt |
2020-06-08 13:25:50 |
80.211.59.57 | attack | 2020-06-08T06:55:19.808716+02:00 |
2020-06-08 13:34:14 |
49.234.203.222 | attackspam | SSH login attempts. |
2020-06-08 13:55:44 |
159.65.154.48 | attackbotsspam | 2020-06-08T05:19:21.576791shield sshd\[3016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=adbizdirectory.com user=root 2020-06-08T05:19:24.249463shield sshd\[3016\]: Failed password for root from 159.65.154.48 port 48038 ssh2 2020-06-08T05:21:13.754587shield sshd\[3198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=adbizdirectory.com user=root 2020-06-08T05:21:16.130770shield sshd\[3198\]: Failed password for root from 159.65.154.48 port 47912 ssh2 2020-06-08T05:23:13.298933shield sshd\[3766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=adbizdirectory.com user=root |
2020-06-08 13:27:28 |