City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.35.138.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.35.138.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:16:35 CST 2025
;; MSG SIZE rcvd: 106
Host 164.138.35.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 164.138.35.21.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.103.142.75 | attack | (mod_security) mod_security (id:210492) triggered by 51.103.142.75 (CH/Switzerland/-): 5 in the last 3600 secs |
2020-09-04 14:37:05 |
| 81.68.95.246 | attackbots | $f2bV_matches |
2020-09-04 15:11:19 |
| 192.144.140.20 | attack | Sep 4 06:12:56 host sshd[3009]: Invalid user magno from 192.144.140.20 port 46398 ... |
2020-09-04 15:02:07 |
| 108.190.190.48 | attackspam | Failed password for invalid user user3 from 108.190.190.48 port 53238 ssh2 |
2020-09-04 15:09:00 |
| 180.76.152.157 | attack | Sep 4 05:19:16 h1745522 sshd[12910]: Invalid user tariq from 180.76.152.157 port 47006 Sep 4 05:19:16 h1745522 sshd[12910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.152.157 Sep 4 05:19:16 h1745522 sshd[12910]: Invalid user tariq from 180.76.152.157 port 47006 Sep 4 05:19:18 h1745522 sshd[12910]: Failed password for invalid user tariq from 180.76.152.157 port 47006 ssh2 Sep 4 05:23:34 h1745522 sshd[13534]: Invalid user testuser5 from 180.76.152.157 port 40676 Sep 4 05:23:34 h1745522 sshd[13534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.152.157 Sep 4 05:23:34 h1745522 sshd[13534]: Invalid user testuser5 from 180.76.152.157 port 40676 Sep 4 05:23:36 h1745522 sshd[13534]: Failed password for invalid user testuser5 from 180.76.152.157 port 40676 ssh2 Sep 4 05:27:56 h1745522 sshd[14140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18 ... |
2020-09-04 14:44:04 |
| 114.246.9.18 | attack | Port Scan ... |
2020-09-04 14:41:17 |
| 138.197.130.138 | attackspambots | 2020-09-04T08:17:48+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-09-04 14:47:52 |
| 2.202.194.246 | attack | Lines containing failures of 2.202.194.246 Sep 2 01:24:44 metroid sshd[2609]: User r.r from 2.202.194.246 not allowed because listed in DenyUsers Sep 2 01:24:44 metroid sshd[2609]: Received disconnect from 2.202.194.246 port 42198:11: Bye Bye [preauth] Sep 2 01:24:44 metroid sshd[2609]: Disconnected from invalid user r.r 2.202.194.246 port 42198 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=2.202.194.246 |
2020-09-04 15:05:40 |
| 105.235.135.204 | attack | Sep 3 18:48:21 mellenthin postfix/smtpd[20928]: NOQUEUE: reject: RCPT from unknown[105.235.135.204]: 554 5.7.1 Service unavailable; Client host [105.235.135.204] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/105.235.135.204; from= |
2020-09-04 14:36:07 |
| 106.54.20.184 | attack | Sep 3 16:43:10 onepixel sshd[1500408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.184 user=root Sep 3 16:43:12 onepixel sshd[1500408]: Failed password for root from 106.54.20.184 port 41586 ssh2 Sep 3 16:45:52 onepixel sshd[1500795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.184 user=root Sep 3 16:45:54 onepixel sshd[1500795]: Failed password for root from 106.54.20.184 port 40458 ssh2 Sep 3 16:48:24 onepixel sshd[1501214]: Invalid user ftp from 106.54.20.184 port 39332 |
2020-09-04 14:34:19 |
| 197.50.232.198 | attackspam | 20/9/3@12:47:44: FAIL: Alarm-Network address from=197.50.232.198 ... |
2020-09-04 15:06:10 |
| 106.12.26.160 | attackbots | Sep 4 05:56:52 prod4 sshd\[24704\]: Invalid user test from 106.12.26.160 Sep 4 05:56:54 prod4 sshd\[24704\]: Failed password for invalid user test from 106.12.26.160 port 36572 ssh2 Sep 4 06:04:40 prod4 sshd\[27383\]: Failed password for root from 106.12.26.160 port 53720 ssh2 ... |
2020-09-04 14:54:33 |
| 95.213.243.71 | attackspam | SSH Invalid Login |
2020-09-04 14:41:03 |
| 146.0.41.70 | attack | Sep 4 00:22:11 lanister sshd[25427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70 user=root Sep 4 00:22:13 lanister sshd[25427]: Failed password for root from 146.0.41.70 port 36316 ssh2 Sep 4 00:25:46 lanister sshd[25519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70 user=root Sep 4 00:25:48 lanister sshd[25519]: Failed password for root from 146.0.41.70 port 42092 ssh2 |
2020-09-04 14:40:45 |
| 124.172.152.184 | attackbots | 21 attempts against mh-misbehave-ban on glow |
2020-09-04 15:07:28 |