City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.142.139.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.142.139.128. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 02:25:47 CST 2025
;; MSG SIZE rcvd: 107
Host 128.139.142.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 128.139.142.21.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.76.223.206 | attackspambots | Oct 15 21:46:12 * sshd[23526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.76.223.206 Oct 15 21:46:14 * sshd[23526]: Failed password for invalid user roshin from 58.76.223.206 port 40982 ssh2 |
2019-10-16 03:59:23 |
| 35.195.143.201 | attackbotsspam | Port Scan |
2019-10-16 03:57:26 |
| 138.197.162.32 | attackspambots | Oct 15 09:51:59 hpm sshd\[21634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32 user=root Oct 15 09:52:01 hpm sshd\[21634\]: Failed password for root from 138.197.162.32 port 55648 ssh2 Oct 15 09:55:53 hpm sshd\[21976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32 user=root Oct 15 09:55:55 hpm sshd\[21976\]: Failed password for root from 138.197.162.32 port 38380 ssh2 Oct 15 09:59:50 hpm sshd\[22311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32 user=root |
2019-10-16 04:12:04 |
| 183.48.35.181 | attackspam | Oct 15 21:59:43 lnxweb62 sshd[24750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.35.181 Oct 15 21:59:43 lnxweb62 sshd[24750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.35.181 |
2019-10-16 04:19:33 |
| 78.198.69.64 | attack | ... |
2019-10-16 04:02:34 |
| 96.1.72.4 | attack | Oct 15 21:27:53 XXX sshd[26512]: Invalid user ofsaa from 96.1.72.4 port 54222 |
2019-10-16 04:04:16 |
| 51.15.159.7 | attackbotsspam | fraudulent SSH attempt |
2019-10-16 04:20:26 |
| 106.75.118.145 | attackspam | Oct 15 21:59:43 lnxweb62 sshd[24757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.118.145 Oct 15 21:59:43 lnxweb62 sshd[24757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.118.145 |
2019-10-16 04:18:14 |
| 218.150.220.194 | attack | Oct 15 21:26:15 XXX sshd[26493]: Invalid user ofsaa from 218.150.220.194 port 34050 |
2019-10-16 04:05:05 |
| 51.77.147.95 | attackbotsspam | Oct 15 22:16:20 SilenceServices sshd[27103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.95 Oct 15 22:16:22 SilenceServices sshd[27103]: Failed password for invalid user s from 51.77.147.95 port 48416 ssh2 Oct 15 22:19:39 SilenceServices sshd[27957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.95 |
2019-10-16 04:31:57 |
| 46.174.65.221 | attackspambots | [portscan] tcp/23 [TELNET] in spfbl.net:'listed' *(RWIN=23858)(10151156) |
2019-10-16 03:51:51 |
| 193.188.22.229 | attackbotsspam | Oct 15 21:56:37 XXX sshd[26893]: Invalid user test from 193.188.22.229 port 18967 |
2019-10-16 04:19:21 |
| 138.197.221.114 | attack | 2019-10-15T20:11:41.847410shield sshd\[12412\]: Invalid user tomcat from 138.197.221.114 port 37922 2019-10-15T20:11:41.852045shield sshd\[12412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.221.114 2019-10-15T20:11:43.959259shield sshd\[12412\]: Failed password for invalid user tomcat from 138.197.221.114 port 37922 ssh2 2019-10-15T20:15:49.878855shield sshd\[14307\]: Invalid user callhome from 138.197.221.114 port 49006 2019-10-15T20:15:49.883182shield sshd\[14307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.221.114 |
2019-10-16 04:16:35 |
| 51.254.204.190 | attackbots | fraudulent SSH attempt |
2019-10-16 04:07:18 |
| 222.186.180.41 | attackspambots | Oct 15 22:14:14 SilenceServices sshd[26508]: Failed password for root from 222.186.180.41 port 32774 ssh2 Oct 15 22:14:26 SilenceServices sshd[26508]: Failed password for root from 222.186.180.41 port 32774 ssh2 Oct 15 22:14:30 SilenceServices sshd[26508]: Failed password for root from 222.186.180.41 port 32774 ssh2 Oct 15 22:14:30 SilenceServices sshd[26508]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 32774 ssh2 [preauth] |
2019-10-16 04:27:59 |