City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 231.94.195.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;231.94.195.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:08:00 CST 2025
;; MSG SIZE rcvd: 106
Host 30.195.94.231.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 30.195.94.231.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.189.209.143 | attack | Jul 3 04:15:38 lnxded64 sshd[13883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.209.143 |
2020-07-03 22:01:17 |
| 201.28.87.42 | attackspam | [SPAM] Will you come to me on the weekend? |
2020-07-03 21:39:12 |
| 141.98.81.208 | attack | Jul 3 15:30:24 debian64 sshd[11417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.208 Jul 3 15:30:26 debian64 sshd[11417]: Failed password for invalid user Administrator from 141.98.81.208 port 20981 ssh2 ... |
2020-07-03 22:08:40 |
| 111.230.210.78 | attackspam | Jul 3 04:11:59 vserver sshd\[1419\]: Invalid user bran from 111.230.210.78Jul 3 04:12:02 vserver sshd\[1419\]: Failed password for invalid user bran from 111.230.210.78 port 46314 ssh2Jul 3 04:15:56 vserver sshd\[1455\]: Invalid user kush from 111.230.210.78Jul 3 04:15:58 vserver sshd\[1455\]: Failed password for invalid user kush from 111.230.210.78 port 59368 ssh2 ... |
2020-07-03 21:55:55 |
| 118.153.251.42 | attack | [SPAM] help is badly needed |
2020-07-03 21:40:30 |
| 134.122.28.208 | attackbots | Jul 3 15:18:33 sip sshd[827072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.28.208 Jul 3 15:18:32 sip sshd[827072]: Invalid user cheryl from 134.122.28.208 port 37898 Jul 3 15:18:35 sip sshd[827072]: Failed password for invalid user cheryl from 134.122.28.208 port 37898 ssh2 ... |
2020-07-03 22:04:26 |
| 219.159.83.164 | attackspam | Jul 3 04:16:58 sso sshd[14708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.159.83.164 Jul 3 04:17:00 sso sshd[14708]: Failed password for invalid user yu from 219.159.83.164 port 6339 ssh2 ... |
2020-07-03 21:45:40 |
| 125.124.91.206 | attackspam | Jul 3 02:15:09 *** sshd[27547]: Invalid user france from 125.124.91.206 |
2020-07-03 21:54:02 |
| 49.212.216.238 | attackspam | bruteforce detected |
2020-07-03 21:57:43 |
| 16.216.96.101 | attackspambots | [SPAM] can you be free tomorrow |
2020-07-03 21:37:55 |
| 41.246.29.250 | attackbots | [SPAM] Personal notes on information request |
2020-07-03 21:42:21 |
| 222.186.169.192 | attackspambots | Jul 3 16:06:33 eventyay sshd[22442]: Failed password for root from 222.186.169.192 port 39326 ssh2 Jul 3 16:06:47 eventyay sshd[22442]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 39326 ssh2 [preauth] Jul 3 16:07:00 eventyay sshd[22445]: Failed password for root from 222.186.169.192 port 8432 ssh2 ... |
2020-07-03 22:09:30 |
| 14.185.23.239 | attackspambots | 1593742381 - 07/03/2020 04:13:01 Host: 14.185.23.239/14.185.23.239 Port: 445 TCP Blocked |
2020-07-03 22:03:02 |
| 209.85.220.69 | attackspam | Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69])
by mx.google.com with SMTPS id t185sor8394064qkb.21.2020.07.03.05.36.11
for <> (Google Transport Security);
Fri, 03 Jul 2020 05:36:12 -0700 (PDT)
JohnAudioTech just uploaded a video
How to select audio amplifier input decoupling capacitor value
http://www.youtube.com/watch?v=xzORxnIpbCs&feature=em-uploademail
John N Nay in Vandalia, OH
Current address Po Box 362, Vandalia, OH 45377
5064 Santa Fe Dr, Dayton, OH 45414
5062 Santa Fe Dr, Dayton, OH 45414
3505 Village Dr, APT H, Franklin, OH 45005
Santa Fe Dr, Dayton, OH 45414
Current Phone (513) 237-9459
Previous Phones
(937) 422-1162
(937) 237-9459
(513) 422-1162 |
2020-07-03 22:12:02 |
| 95.180.254.147 | attackspam | 400 BAD REQUEST |
2020-07-03 22:03:24 |