City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.157.99.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.157.99.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:53:13 CST 2025
;; MSG SIZE rcvd: 106
42.99.157.207.in-addr.arpa domain name pointer 42.bstc.cc.al.us.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.99.157.207.in-addr.arpa name = 42.bstc.cc.al.us.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.231.237.245 | attackbots | Oct 1 15:22:05 localhost sshd\[29052\]: Invalid user ux from 111.231.237.245 port 45193 Oct 1 15:22:05 localhost sshd\[29052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.237.245 Oct 1 15:22:07 localhost sshd\[29052\]: Failed password for invalid user ux from 111.231.237.245 port 45193 ssh2 |
2019-10-01 23:20:13 |
| 222.186.15.65 | attackspambots | Oct 1 16:42:19 dedicated sshd[20291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.65 user=root Oct 1 16:42:21 dedicated sshd[20291]: Failed password for root from 222.186.15.65 port 50486 ssh2 |
2019-10-01 22:42:47 |
| 77.21.25.7 | attack | Oct 1 17:00:39 localhost sshd\[3137\]: Invalid user pi from 77.21.25.7 Oct 1 17:00:39 localhost sshd\[3136\]: Invalid user pi from 77.21.25.7 Oct 1 17:00:39 localhost sshd\[3137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.21.25.7 Oct 1 17:00:39 localhost sshd\[3136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.21.25.7 Oct 1 17:00:41 localhost sshd\[3137\]: Failed password for invalid user pi from 77.21.25.7 port 43164 ssh2 ... |
2019-10-01 23:19:16 |
| 124.41.211.27 | attackbotsspam | Oct 1 15:59:19 OPSO sshd\[20448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27 user=sync Oct 1 15:59:21 OPSO sshd\[20448\]: Failed password for sync from 124.41.211.27 port 37584 ssh2 Oct 1 16:05:31 OPSO sshd\[21763\]: Invalid user build from 124.41.211.27 port 49110 Oct 1 16:05:31 OPSO sshd\[21763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27 Oct 1 16:05:33 OPSO sshd\[21763\]: Failed password for invalid user build from 124.41.211.27 port 49110 ssh2 |
2019-10-01 22:39:34 |
| 46.105.129.129 | attack | Oct 1 10:10:24 ny01 sshd[14116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.129.129 Oct 1 10:10:26 ny01 sshd[14116]: Failed password for invalid user ka from 46.105.129.129 port 60718 ssh2 Oct 1 10:14:07 ny01 sshd[14759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.129.129 |
2019-10-01 22:40:06 |
| 218.94.136.90 | attackspambots | Oct 1 14:15:33 [host] sshd[21253]: Invalid user soporte from 218.94.136.90 Oct 1 14:15:33 [host] sshd[21253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90 Oct 1 14:15:35 [host] sshd[21253]: Failed password for invalid user soporte from 218.94.136.90 port 26223 ssh2 |
2019-10-01 23:15:18 |
| 45.70.217.198 | attackbotsspam | Oct 1 04:57:48 tdfoods sshd\[23362\]: Invalid user user from 45.70.217.198 Oct 1 04:57:48 tdfoods sshd\[23362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.217.198 Oct 1 04:57:50 tdfoods sshd\[23362\]: Failed password for invalid user user from 45.70.217.198 port 34322 ssh2 Oct 1 05:02:32 tdfoods sshd\[23819\]: Invalid user gayle from 45.70.217.198 Oct 1 05:02:32 tdfoods sshd\[23819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.217.198 |
2019-10-01 23:16:02 |
| 222.91.198.255 | attack | Oct 1 11:15:03 debian sshd\[10257\]: Invalid user zxvf from 222.91.198.255 port 7130 Oct 1 11:15:03 debian sshd\[10257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.198.255 Oct 1 11:15:06 debian sshd\[10257\]: Failed password for invalid user zxvf from 222.91.198.255 port 7130 ssh2 ... |
2019-10-01 23:16:36 |
| 185.216.32.170 | attack | Oct 1 15:44:37 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct 1 15:44:39 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct 1 15:44:41 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct 1 15:44:44 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct 1 15:44:46 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct 1 15:44:49 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2 ... |
2019-10-01 23:01:48 |
| 196.52.43.119 | attackspambots | 67/tcp 135/tcp 110/tcp... [2019-08-01/10-01]31pkt,23pt.(tcp),4pt.(udp) |
2019-10-01 22:47:49 |
| 211.253.25.21 | attack | Oct 1 16:19:25 dev0-dcde-rnet sshd[3335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.25.21 Oct 1 16:19:27 dev0-dcde-rnet sshd[3335]: Failed password for invalid user christa from 211.253.25.21 port 55284 ssh2 Oct 1 16:24:49 dev0-dcde-rnet sshd[3350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.25.21 |
2019-10-01 22:47:29 |
| 106.225.129.108 | attack | Automatic report - Banned IP Access |
2019-10-01 23:26:11 |
| 216.218.206.88 | attackspambots | 6379/tcp 30005/tcp 2323/tcp... [2019-08-01/09-29]20pkt,16pt.(tcp) |
2019-10-01 23:25:53 |
| 121.142.111.98 | attackbots | SSH Brute-Force reported by Fail2Ban |
2019-10-01 22:40:51 |
| 62.210.105.116 | attackbotsspam | Oct 1 15:19:34 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct 1 15:19:37 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct 1 15:19:39 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct 1 15:19:41 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct 1 15:19:43 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct 1 15:19:46 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2 ... |
2019-10-01 22:54:30 |