City: unknown
Region: unknown
Country: Lithuania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.103.74.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.103.74.170. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 14:43:48 CST 2025
;; MSG SIZE rcvd: 107
170.74.103.213.in-addr.arpa domain name pointer m213-103-74-170.cust.tele2.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
170.74.103.213.in-addr.arpa name = m213-103-74-170.cust.tele2.lt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 188.131.173.220 | attackbotsspam | Dec 9 14:12:18 XXX sshd[10652]: Invalid user squid from 188.131.173.220 port 51888 |
2019-12-10 05:52:52 |
| 106.12.96.95 | attack | Dec 9 18:57:36 *** sshd[15129]: Invalid user mysql from 106.12.96.95 |
2019-12-10 06:00:43 |
| 150.164.192.65 | attackbotsspam | Unauthorized connection attempt detected from IP address 150.164.192.65 to port 445 |
2019-12-10 05:31:23 |
| 158.69.204.172 | attackspam | Dec 9 22:14:09 sauna sshd[90166]: Failed password for news from 158.69.204.172 port 54278 ssh2 ... |
2019-12-10 05:58:26 |
| 159.89.169.137 | attackspam | Dec 9 08:17:04 wbs sshd\[8354\]: Invalid user Reijo from 159.89.169.137 Dec 9 08:17:04 wbs sshd\[8354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137 Dec 9 08:17:06 wbs sshd\[8354\]: Failed password for invalid user Reijo from 159.89.169.137 port 36166 ssh2 Dec 9 08:23:25 wbs sshd\[9042\]: Invalid user agogino from 159.89.169.137 Dec 9 08:23:25 wbs sshd\[9042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137 |
2019-12-10 06:09:08 |
| 67.215.238.46 | attackbots | [munged]::80 67.215.238.46 - - [09/Dec/2019:15:59:49 +0100] "POST /[munged]: HTTP/1.1" 200 3861 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 67.215.238.46 - - [09/Dec/2019:15:59:50 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 67.215.238.46 - - [09/Dec/2019:15:59:51 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 67.215.238.46 - - [09/Dec/2019:15:59:52 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 67.215.238.46 - - [09/Dec/2019:15:59:53 +0100] "POST /[munged]: HTTP/1.1" 200 3860 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 67.215.238.46 - - [09/Dec/2019:15:59:54 +0100] |
2019-12-10 05:52:10 |
| 177.129.111.46 | attackspam | Unauthorized connection attempt from IP address 177.129.111.46 on Port 445(SMB) |
2019-12-10 05:40:17 |
| 162.243.94.34 | attackspam | Dec 9 22:39:54 sso sshd[18667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.94.34 Dec 9 22:39:56 sso sshd[18667]: Failed password for invalid user squid from 162.243.94.34 port 53131 ssh2 ... |
2019-12-10 05:58:00 |
| 117.69.46.235 | attackspambots | SpamReport |
2019-12-10 05:46:08 |
| 129.211.24.104 | attackbotsspam | 2019-12-09T22:05:00.812404abusebot.cloudsearch.cf sshd\[30741\]: Invalid user Taina from 129.211.24.104 port 56202 |
2019-12-10 06:07:13 |
| 118.27.3.163 | attackspambots | 2019-12-09T21:27:24.448775abusebot.cloudsearch.cf sshd\[28845\]: Invalid user JeanPaul@123 from 118.27.3.163 port 59300 |
2019-12-10 05:55:48 |
| 91.166.58.22 | attackspambots | failed root login |
2019-12-10 05:30:06 |
| 111.231.144.219 | attack | $f2bV_matches |
2019-12-10 06:07:39 |
| 157.245.43.136 | attack | smtp |
2019-12-10 05:32:49 |
| 58.22.61.212 | attackbotsspam | Dec 9 17:40:53 Ubuntu-1404-trusty-64-minimal sshd\[30847\]: Invalid user rpc from 58.22.61.212 Dec 9 17:40:53 Ubuntu-1404-trusty-64-minimal sshd\[30847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.22.61.212 Dec 9 17:40:55 Ubuntu-1404-trusty-64-minimal sshd\[30847\]: Failed password for invalid user rpc from 58.22.61.212 port 45340 ssh2 Dec 9 17:52:00 Ubuntu-1404-trusty-64-minimal sshd\[5537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.22.61.212 user=root Dec 9 17:52:02 Ubuntu-1404-trusty-64-minimal sshd\[5537\]: Failed password for root from 58.22.61.212 port 57374 ssh2 |
2019-12-10 05:30:50 |