City: Vilnius
Region: Vilnius
Country: Lithuania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.159.42.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.159.42.68. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023042301 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 24 04:31:35 CST 2023
;; MSG SIZE rcvd: 106
68.42.159.213.in-addr.arpa domain name pointer lan-213-159-42-68.vln.penki.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.42.159.213.in-addr.arpa name = lan-213-159-42-68.vln.penki.lt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.51.176.111 | attack | odoo8 ... |
2020-06-13 12:43:10 |
| 177.23.58.23 | attackspam | Jun 13 06:33:10 srv-ubuntu-dev3 sshd[48160]: Invalid user xh from 177.23.58.23 Jun 13 06:33:10 srv-ubuntu-dev3 sshd[48160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.58.23 Jun 13 06:33:10 srv-ubuntu-dev3 sshd[48160]: Invalid user xh from 177.23.58.23 Jun 13 06:33:12 srv-ubuntu-dev3 sshd[48160]: Failed password for invalid user xh from 177.23.58.23 port 51260 ssh2 Jun 13 06:37:20 srv-ubuntu-dev3 sshd[48776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.58.23 user=root Jun 13 06:37:21 srv-ubuntu-dev3 sshd[48776]: Failed password for root from 177.23.58.23 port 53318 ssh2 Jun 13 06:41:31 srv-ubuntu-dev3 sshd[49417]: Invalid user mikkel from 177.23.58.23 Jun 13 06:41:31 srv-ubuntu-dev3 sshd[49417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.58.23 Jun 13 06:41:31 srv-ubuntu-dev3 sshd[49417]: Invalid user mikkel from 177.23.58.23 Jun 13 0 ... |
2020-06-13 12:56:21 |
| 46.38.150.142 | attack | 2020-06-13 07:53:45 dovecot_login authenticator failed for \(User\) \[46.38.150.142\]: 535 Incorrect authentication data \(set_id=lj@org.ua\)2020-06-13 07:54:36 dovecot_login authenticator failed for \(User\) \[46.38.150.142\]: 535 Incorrect authentication data \(set_id=arlington@org.ua\)2020-06-13 07:55:17 dovecot_login authenticator failed for \(User\) \[46.38.150.142\]: 535 Incorrect authentication data \(set_id=AB\023@org.ua\) ... |
2020-06-13 12:55:29 |
| 50.70.229.239 | attackspambots | 5x Failed Password |
2020-06-13 13:22:28 |
| 124.42.83.34 | attackspam | Jun 13 05:01:44 rush sshd[22230]: Failed password for root from 124.42.83.34 port 47975 ssh2 Jun 13 05:03:36 rush sshd[22255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.83.34 Jun 13 05:03:37 rush sshd[22255]: Failed password for invalid user yanglin from 124.42.83.34 port 33030 ssh2 ... |
2020-06-13 13:18:42 |
| 51.91.247.125 | attackspam | Unauthorized connection attempt detected from IP address 51.91.247.125 to port 7443 |
2020-06-13 12:45:57 |
| 178.128.242.233 | attackspambots | Jun 13 00:39:06 NPSTNNYC01T sshd[26111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233 Jun 13 00:39:08 NPSTNNYC01T sshd[26111]: Failed password for invalid user newsnet from 178.128.242.233 port 58258 ssh2 Jun 13 00:42:18 NPSTNNYC01T sshd[26354]: Failed password for root from 178.128.242.233 port 59280 ssh2 ... |
2020-06-13 12:53:27 |
| 128.199.84.201 | attack | Jun 13 06:10:46 cp sshd[6186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201 Jun 13 06:10:46 cp sshd[6186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201 |
2020-06-13 13:21:28 |
| 222.186.42.136 | attackspam | $f2bV_matches |
2020-06-13 13:25:10 |
| 116.58.230.14 | attackbotsspam | 1592021453 - 06/13/2020 06:10:53 Host: 116.58.230.14/116.58.230.14 Port: 445 TCP Blocked |
2020-06-13 13:12:49 |
| 182.61.105.104 | attackbots | Jun 13 06:08:17 vps647732 sshd[27939]: Failed password for root from 182.61.105.104 port 38254 ssh2 Jun 13 06:11:09 vps647732 sshd[28100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104 ... |
2020-06-13 12:54:04 |
| 36.67.106.109 | attackspam | Jun 13 04:54:45 hcbbdb sshd\[16122\]: Invalid user tpz from 36.67.106.109 Jun 13 04:54:45 hcbbdb sshd\[16122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.106.109 Jun 13 04:54:48 hcbbdb sshd\[16122\]: Failed password for invalid user tpz from 36.67.106.109 port 51330 ssh2 Jun 13 04:58:16 hcbbdb sshd\[16460\]: Invalid user okilab from 36.67.106.109 Jun 13 04:58:16 hcbbdb sshd\[16460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.106.109 |
2020-06-13 12:58:57 |
| 176.31.252.148 | attackspam | Jun 13 10:00:23 dhoomketu sshd[700510]: Failed password for invalid user alyssa from 176.31.252.148 port 60336 ssh2 Jun 13 10:03:23 dhoomketu sshd[700609]: Invalid user augusta from 176.31.252.148 port 33923 Jun 13 10:03:23 dhoomketu sshd[700609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.252.148 Jun 13 10:03:23 dhoomketu sshd[700609]: Invalid user augusta from 176.31.252.148 port 33923 Jun 13 10:03:25 dhoomketu sshd[700609]: Failed password for invalid user augusta from 176.31.252.148 port 33923 ssh2 ... |
2020-06-13 12:51:34 |
| 167.71.38.64 | attackspambots | Jun 13 06:12:59 cdc sshd[15938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.38.64 Jun 13 06:13:02 cdc sshd[15938]: Failed password for invalid user test from 167.71.38.64 port 48864 ssh2 |
2020-06-13 13:16:24 |
| 61.223.161.225 | attackspambots | Port probing on unauthorized port 23 |
2020-06-13 13:07:14 |