City: unknown
Region: unknown
Country: Venezuela
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.242.112.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;201.242.112.14. IN A
;; AUTHORITY SECTION:
. 293 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:25:18 CST 2022
;; MSG SIZE rcvd: 107
14.112.242.201.in-addr.arpa domain name pointer 201-242-112-14.genericrev.cantv.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.112.242.201.in-addr.arpa name = 201-242-112-14.genericrev.cantv.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
46.105.209.40 | attackbotsspam | Nov 28 06:38:59 mail postfix/smtpd[21811]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:38:59 mail postfix/smtpd[20999]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:39:03 mail postfix/smtpd[22956]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:39:03 mail postfix/smtpd[20859]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:39:03 mail postfix/smtpd[21165]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:39:03 mail postfix/smtpd[21560]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:39:03 mail postfix/smtpd[21844]: warning: ip40.ip-46-105-209.eu[46.105.209.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 06:39:03 mail postfix/smtpd[20426]: warning: ip40.ip-46-1 |
2019-11-28 14:00:44 |
140.143.242.159 | attack | Nov 28 04:52:18 124388 sshd[16664]: Invalid user mountsys from 140.143.242.159 port 57954 Nov 28 04:52:18 124388 sshd[16664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.242.159 Nov 28 04:52:18 124388 sshd[16664]: Invalid user mountsys from 140.143.242.159 port 57954 Nov 28 04:52:20 124388 sshd[16664]: Failed password for invalid user mountsys from 140.143.242.159 port 57954 ssh2 Nov 28 04:56:59 124388 sshd[16726]: Invalid user thorbjoern from 140.143.242.159 port 33892 |
2019-11-28 14:06:43 |
218.92.0.173 | attackbots | Nov 28 06:39:49 meumeu sshd[7485]: Failed password for root from 218.92.0.173 port 31195 ssh2 Nov 28 06:40:08 meumeu sshd[7485]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 31195 ssh2 [preauth] Nov 28 06:40:13 meumeu sshd[7527]: Failed password for root from 218.92.0.173 port 7237 ssh2 ... |
2019-11-28 13:42:49 |
159.203.13.141 | attackspam | Nov 28 00:09:11 linuxvps sshd\[43045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.141 user=root Nov 28 00:09:12 linuxvps sshd\[43045\]: Failed password for root from 159.203.13.141 port 54992 ssh2 Nov 28 00:15:06 linuxvps sshd\[46353\]: Invalid user macedo from 159.203.13.141 Nov 28 00:15:06 linuxvps sshd\[46353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.141 Nov 28 00:15:08 linuxvps sshd\[46353\]: Failed password for invalid user macedo from 159.203.13.141 port 60450 ssh2 |
2019-11-28 13:46:23 |
165.227.53.38 | attackspambots | Nov 28 06:28:50 legacy sshd[16179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.53.38 Nov 28 06:28:52 legacy sshd[16179]: Failed password for invalid user demo from 165.227.53.38 port 54424 ssh2 Nov 28 06:35:13 legacy sshd[16349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.53.38 ... |
2019-11-28 13:55:52 |
52.38.214.62 | attackbotsspam | B: Abusive content scan (301) |
2019-11-28 13:54:20 |
27.69.242.187 | attack | Nov 28 00:17:49 bilbo sshd[15413]: User root from 27.69.242.187 not allowed because not listed in AllowUsers Nov 28 00:17:50 bilbo sshd[15415]: Invalid user admin from 27.69.242.187 Nov 28 00:17:51 bilbo sshd[15417]: Invalid user user from 27.69.242.187 Nov 28 00:17:54 bilbo sshd[15419]: Invalid user john from 27.69.242.187 ... |
2019-11-28 13:41:15 |
112.85.42.178 | attack | Nov 27 19:32:36 hpm sshd\[5337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=root Nov 27 19:32:38 hpm sshd\[5337\]: Failed password for root from 112.85.42.178 port 12836 ssh2 Nov 27 19:32:41 hpm sshd\[5337\]: Failed password for root from 112.85.42.178 port 12836 ssh2 Nov 27 19:32:44 hpm sshd\[5337\]: Failed password for root from 112.85.42.178 port 12836 ssh2 Nov 27 19:32:55 hpm sshd\[5372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=root |
2019-11-28 13:43:42 |
160.20.13.28 | attackspam | Nov 28 05:36:29 mxgate1 postfix/postscreen[22663]: CONNECT from [160.20.13.28]:14374 to [176.31.12.44]:25 Nov 28 05:36:35 mxgate1 postfix/postscreen[22663]: PASS NEW [160.20.13.28]:14374 Nov 28 05:36:36 mxgate1 postfix/smtpd[22671]: warning: hostname mail-a.greyinkpublications.com does not resolve to address 160.20.13.28: Name or service not known Nov 28 05:36:36 mxgate1 postfix/smtpd[22671]: connect from unknown[160.20.13.28] Nov x@x Nov x@x Nov 28 05:36:48 mxgate1 postfix/postscreen[22663]: CONNECT from [160.20.13.28]:41749 to [176.31.12.44]:25 Nov 28 05:36:48 mxgate1 postfix/postscreen[22663]: PASS OLD [160.20.13.28]:41749 Nov 28 05:36:48 mxgate1 postfix/smtpd[22687]: warning: hostname mail-a.greyinkpublications.com does not resolve to address 160.20.13.28: Name or service not known Nov 28 05:36:48 mxgate1 postfix/smtpd[22687]: connect from unknown[160.20.13.28] Nov 28 05:36:49 mxgate1 postfix/postscreen[22663]: CONNECT from [160.20.13.28]:28213 to [176.31.12.44]:25 ........ ------------------------------- |
2019-11-28 13:32:36 |
141.98.11.8 | attackspam | RDP Brute Force attempt, PTR: None |
2019-11-28 14:09:51 |
63.240.240.74 | attack | Nov 28 06:56:26 DAAP sshd[5327]: Invalid user oracle from 63.240.240.74 port 49923 Nov 28 06:56:26 DAAP sshd[5327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74 Nov 28 06:56:26 DAAP sshd[5327]: Invalid user oracle from 63.240.240.74 port 49923 Nov 28 06:56:28 DAAP sshd[5327]: Failed password for invalid user oracle from 63.240.240.74 port 49923 ssh2 Nov 28 07:02:46 DAAP sshd[5390]: Invalid user admin from 63.240.240.74 port 40599 ... |
2019-11-28 14:05:50 |
182.61.54.213 | attackspambots | Nov 28 06:36:13 ns37 sshd[12881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213 Nov 28 06:36:13 ns37 sshd[12881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213 |
2019-11-28 13:36:22 |
68.183.160.63 | attackbots | 2019-11-28T05:36:14.674086shield sshd\[26234\]: Invalid user frubencd from 68.183.160.63 port 60362 2019-11-28T05:36:14.678461shield sshd\[26234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63 2019-11-28T05:36:16.878293shield sshd\[26234\]: Failed password for invalid user frubencd from 68.183.160.63 port 60362 ssh2 2019-11-28T05:41:44.956200shield sshd\[26515\]: Invalid user cgleonr from 68.183.160.63 port 48002 2019-11-28T05:41:44.961241shield sshd\[26515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63 |
2019-11-28 13:42:20 |
148.70.3.199 | attackbotsspam | Nov 28 11:07:20 vibhu-HP-Z238-Microtower-Workstation sshd\[31936\]: Invalid user ftpuser from 148.70.3.199 Nov 28 11:07:20 vibhu-HP-Z238-Microtower-Workstation sshd\[31936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199 Nov 28 11:07:23 vibhu-HP-Z238-Microtower-Workstation sshd\[31936\]: Failed password for invalid user ftpuser from 148.70.3.199 port 35018 ssh2 Nov 28 11:15:53 vibhu-HP-Z238-Microtower-Workstation sshd\[32368\]: Invalid user apache from 148.70.3.199 Nov 28 11:15:53 vibhu-HP-Z238-Microtower-Workstation sshd\[32368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199 ... |
2019-11-28 14:02:46 |
138.197.175.236 | attack | 2019-11-28T05:10:13.541080shield sshd\[21995\]: Invalid user g00fus from 138.197.175.236 port 37042 2019-11-28T05:10:13.545235shield sshd\[21995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236 2019-11-28T05:10:15.444527shield sshd\[21995\]: Failed password for invalid user g00fus from 138.197.175.236 port 37042 ssh2 2019-11-28T05:16:22.215276shield sshd\[23295\]: Invalid user dean from 138.197.175.236 port 44628 2019-11-28T05:16:22.219401shield sshd\[23295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236 |
2019-11-28 13:39:33 |