City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.193.242.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.193.242.196. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 17:10:28 CST 2025
;; MSG SIZE rcvd: 108
Host 196.242.193.198.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 196.242.193.198.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
182.61.22.140 | attackspam | Jun 7 16:27:29 Host-KEWR-E sshd[27040]: User root from 182.61.22.140 not allowed because not listed in AllowUsers ... |
2020-06-08 05:32:51 |
83.12.171.68 | attackspam | Tried sshing with brute force. |
2020-06-08 05:23:16 |
185.53.198.197 | attackbotsspam | . |
2020-06-08 05:05:11 |
179.107.34.178 | attackspam | Jun 7 23:10:32 home sshd[25071]: Failed password for root from 179.107.34.178 port 28892 ssh2 Jun 7 23:14:13 home sshd[25506]: Failed password for root from 179.107.34.178 port 57264 ssh2 ... |
2020-06-08 05:20:37 |
124.195.185.19 | attackbots | Port Scan detected! ... |
2020-06-08 05:27:02 |
202.158.1.122 | attackspambots | DATE:2020-06-07 22:27:37, IP:202.158.1.122, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2020-06-08 05:24:09 |
20.43.59.229 | attackspam | Jun 7 23:27:43 debian kernel: [464222.366291] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=20.43.59.229 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=3623 PROTO=TCP SPT=43426 DPT=4650 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-08 05:19:16 |
128.199.220.207 | attack | 2020-06-07T20:22:16.017607shield sshd\[32502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 user=root 2020-06-07T20:22:17.749038shield sshd\[32502\]: Failed password for root from 128.199.220.207 port 55482 ssh2 2020-06-07T20:24:58.142935shield sshd\[32697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 user=root 2020-06-07T20:25:00.115069shield sshd\[32697\]: Failed password for root from 128.199.220.207 port 42244 ssh2 2020-06-07T20:27:41.705672shield sshd\[626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 user=root |
2020-06-08 05:20:08 |
222.186.175.182 | attackspambots | Failed password for invalid user from 222.186.175.182 port 18340 ssh2 |
2020-06-08 05:09:22 |
138.219.223.218 | attackbots | $f2bV_matches |
2020-06-08 04:58:57 |
118.24.6.69 | attackbotsspam | Jun 7 22:40:09 vps647732 sshd[1240]: Failed password for root from 118.24.6.69 port 48415 ssh2 ... |
2020-06-08 05:16:56 |
46.101.151.52 | attack | Jun 7 22:37:01 vps687878 sshd\[25683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.52 user=root Jun 7 22:37:03 vps687878 sshd\[25683\]: Failed password for root from 46.101.151.52 port 49168 ssh2 Jun 7 22:40:21 vps687878 sshd\[26113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.52 user=root Jun 7 22:40:24 vps687878 sshd\[26113\]: Failed password for root from 46.101.151.52 port 51426 ssh2 Jun 7 22:43:47 vps687878 sshd\[26676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.52 user=root ... |
2020-06-08 05:31:26 |
198.12.68.33 | attack | (From bellm1233@gmail.com) Hi there! I'm a freelance online marketer who's seeking new clients interested in getting more traffic to their websites. Can you please help me out a bit? I'd like to speak to the person in your company who is in charge on managing the website, and I would really appreciate it if you could forward this message to them and have them respond to me. If you're in need of SEO, I can assist you for a cheap cost. I've been a freelance search engine optimization specialist for 10 years and can get your site up where you need it to be. Boosting your ranking in search engines can progressively increase the amount of traffic you get in your site. Even just having high placements on Google alone for specific keywords relating to your business can really boost your sales. I'd like to help your company progress to the next level. Please write back to let me know if you're interested and I'll provide you with a free consultation and pricing on my services. I hope to speak with you soon |
2020-06-08 05:11:14 |
189.195.41.134 | attack | Jun 7 22:42:37 inter-technics sshd[1553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.195.41.134 user=root Jun 7 22:42:39 inter-technics sshd[1553]: Failed password for root from 189.195.41.134 port 56674 ssh2 Jun 7 22:44:52 inter-technics sshd[1666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.195.41.134 user=root Jun 7 22:44:54 inter-technics sshd[1666]: Failed password for root from 189.195.41.134 port 42172 ssh2 Jun 7 22:47:09 inter-technics sshd[1825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.195.41.134 user=root Jun 7 22:47:11 inter-technics sshd[1825]: Failed password for root from 189.195.41.134 port 55902 ssh2 ... |
2020-06-08 05:00:09 |
192.3.255.139 | attackspam | Jun 7 22:49:52 legacy sshd[28665]: Failed password for root from 192.3.255.139 port 60896 ssh2 Jun 7 22:54:08 legacy sshd[28834]: Failed password for root from 192.3.255.139 port 35628 ssh2 ... |
2020-06-08 05:14:52 |