City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.140.12.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.140.12.202. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 06:27:03 CST 2025
;; MSG SIZE rcvd: 106
Host 202.12.140.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 202.12.140.21.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.242.116.72 | attack | Dec 18 08:30:16 grey postfix/smtpd\[19409\]: NOQUEUE: reject: RCPT from snow.pahlupi.com\[103.242.116.72\]: 554 5.7.1 Service unavailable\; Client host \[103.242.116.72\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[103.242.116.72\]\; from=\ |
2019-12-18 21:10:52 |
| 14.253.148.114 | attackspambots | Unauthorized connection attempt from IP address 14.253.148.114 on Port 445(SMB) |
2019-12-18 20:53:51 |
| 96.30.79.84 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 06:25:17. |
2019-12-18 20:44:41 |
| 188.165.254.85 | attackbotsspam | Dec 18 09:00:42 firewall sshd[548]: Failed password for invalid user host from 188.165.254.85 port 46086 ssh2 Dec 18 09:05:35 firewall sshd[687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.254.85 user=root Dec 18 09:05:37 firewall sshd[687]: Failed password for root from 188.165.254.85 port 53468 ssh2 ... |
2019-12-18 21:03:46 |
| 211.23.156.145 | attackspam | Unauthorized connection attempt detected from IP address 211.23.156.145 to port 445 |
2019-12-18 20:51:56 |
| 159.203.197.155 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-12-18 21:12:12 |
| 49.234.201.90 | attackspambots | Nov 21 21:13:07 microserver sshd[15807]: Invalid user ntps from 49.234.201.90 port 50162 Nov 21 21:13:07 microserver sshd[15807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.201.90 Nov 21 21:13:10 microserver sshd[15807]: Failed password for invalid user ntps from 49.234.201.90 port 50162 ssh2 Nov 21 21:21:33 microserver sshd[17031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.201.90 user=root Nov 21 21:21:35 microserver sshd[17031]: Failed password for root from 49.234.201.90 port 36920 ssh2 Dec 18 09:57:55 microserver sshd[37691]: Invalid user misc from 49.234.201.90 port 60158 Dec 18 09:57:55 microserver sshd[37691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.201.90 Dec 18 09:57:57 microserver sshd[37691]: Failed password for invalid user misc from 49.234.201.90 port 60158 ssh2 Dec 18 10:05:04 microserver sshd[38700]: pam_unix(sshd:auth): authentication |
2019-12-18 21:15:39 |
| 171.15.16.116 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2019-12-18 20:52:16 |
| 45.141.84.89 | attackbots | RDP Bruteforce |
2019-12-18 21:21:29 |
| 14.231.111.153 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 06:25:12. |
2019-12-18 20:56:20 |
| 103.9.90.3 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 06:25:09. |
2019-12-18 21:01:30 |
| 103.124.12.36 | attackbotsspam | Cluster member 192.168.0.31 (-) said, DENY 103.124.12.36, Reason:[(imapd) Failed IMAP login from 103.124.12.36 (IN/India/-): 1 in the last 3600 secs] |
2019-12-18 21:14:11 |
| 175.176.23.13 | attackspambots | Automatic report - Port Scan |
2019-12-18 20:43:39 |
| 106.51.39.234 | attack | Unauthorized connection attempt from IP address 106.51.39.234 on Port 445(SMB) |
2019-12-18 20:47:29 |
| 130.105.53.71 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 18-12-2019 06:25:10. |
2019-12-18 20:59:47 |