City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.42.121.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.42.121.47. IN A
;; AUTHORITY SECTION:
. 230 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 17:07:48 CST 2022
;; MSG SIZE rcvd: 106
Host 47.121.42.199.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 47.121.42.199.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
103.207.36.110 | attackbots | Aug 25 13:22:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=103.207.36.110 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=24399 PROTO=TCP SPT=45919 DPT=31402 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 25 13:27:59 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=103.207.36.110 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=57582 PROTO=TCP SPT=45919 DPT=31553 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 25 13:35:23 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=103.207.36.110 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=307 PROTO=TCP SPT=45919 DPT=37034 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 25 13:56:14 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=103.207.36.110 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=35945 PROTO=TCP SPT=45919 DPT=39744 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 25 13:59:23 *hidde ... |
2020-08-25 23:55:41 |
151.254.155.149 | attack | 151.254.155.149 |
2020-08-26 00:17:50 |
138.219.201.25 | attack | Aug 25 09:28:00 vps46666688 sshd[12456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.201.25 Aug 25 09:28:02 vps46666688 sshd[12456]: Failed password for invalid user dbadmin from 138.219.201.25 port 57704 ssh2 ... |
2020-08-25 23:45:44 |
119.45.122.102 | attackspam | Aug 25 06:56:24 pixelmemory sshd[333497]: Failed password for root from 119.45.122.102 port 42684 ssh2 Aug 25 06:59:43 pixelmemory sshd[333888]: Invalid user git from 119.45.122.102 port 45036 Aug 25 06:59:43 pixelmemory sshd[333888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.122.102 Aug 25 06:59:43 pixelmemory sshd[333888]: Invalid user git from 119.45.122.102 port 45036 Aug 25 06:59:45 pixelmemory sshd[333888]: Failed password for invalid user git from 119.45.122.102 port 45036 ssh2 ... |
2020-08-25 23:48:59 |
177.182.134.145 | attackspambots | "$f2bV_matches" |
2020-08-25 23:41:52 |
35.245.33.180 | attackbots | Aug 25 13:53:42 minden010 sshd[14551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.245.33.180 Aug 25 13:53:44 minden010 sshd[14551]: Failed password for invalid user deploy from 35.245.33.180 port 39830 ssh2 Aug 25 13:59:13 minden010 sshd[15211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.245.33.180 ... |
2020-08-26 00:06:40 |
83.48.101.184 | attackbotsspam | Repeated brute force against a port |
2020-08-25 23:58:42 |
194.29.63.96 | attackbotsspam | Aug 25 14:23:17 vm1 sshd[10754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.29.63.96 Aug 25 14:23:19 vm1 sshd[10754]: Failed password for invalid user git from 194.29.63.96 port 58674 ssh2 ... |
2020-08-25 23:35:40 |
119.29.3.45 | attackbotsspam | Invalid user 13 from 119.29.3.45 port 59025 |
2020-08-25 23:49:51 |
111.229.215.184 | attack | Aug 25 16:50:54 fhem-rasp sshd[5595]: Invalid user fmaster from 111.229.215.184 port 45266 ... |
2020-08-25 23:52:09 |
159.89.166.91 | attackspambots | Invalid user ard from 159.89.166.91 port 59946 |
2020-08-25 23:44:08 |
52.152.160.139 | attack | 2020-08-25T07:35:39.388021morrigan.ad5gb.com sshd[616801]: Failed password for root from 52.152.160.139 port 40894 ssh2 2020-08-25T07:35:40.078167morrigan.ad5gb.com sshd[616801]: Disconnected from authenticating user root 52.152.160.139 port 40894 [preauth] |
2020-08-26 00:03:45 |
201.49.110.210 | attackspambots | Aug 25 16:31:09 |
2020-08-25 23:34:17 |
179.216.176.168 | attackspambots | Aug 25 17:34:19 ncomp sshd[471]: Invalid user openerp from 179.216.176.168 Aug 25 17:34:19 ncomp sshd[471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.216.176.168 Aug 25 17:34:19 ncomp sshd[471]: Invalid user openerp from 179.216.176.168 Aug 25 17:34:21 ncomp sshd[471]: Failed password for invalid user openerp from 179.216.176.168 port 46191 ssh2 |
2020-08-25 23:40:42 |
40.89.134.4 | attackspam | Aug 25 15:33:42 ns3033917 sshd[13474]: Invalid user dustin from 40.89.134.4 port 34234 Aug 25 15:33:44 ns3033917 sshd[13474]: Failed password for invalid user dustin from 40.89.134.4 port 34234 ssh2 Aug 25 15:43:17 ns3033917 sshd[13586]: Invalid user test from 40.89.134.4 port 38668 ... |
2020-08-26 00:49:37 |