City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.12.122.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.12.122.13. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:11:48 CST 2025
;; MSG SIZE rcvd: 106
Host 13.122.12.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.122.12.242.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.175.93.101 | attackspam | Multiport scan : 15 ports scanned 5922 5923 5924 5925 5926 5927 5928 5929 5930 5931(x2) 5932 5933 5934(x2) 5935 5937(x2) |
2019-10-05 18:42:57 |
| 104.218.51.213 | attack | xmlrpc attack |
2019-10-05 18:39:25 |
| 122.191.79.42 | attackspambots | Oct 5 12:23:04 www sshd\[7377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.191.79.42 user=root Oct 5 12:23:06 www sshd\[7377\]: Failed password for root from 122.191.79.42 port 60704 ssh2 Oct 5 12:27:47 www sshd\[7395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.191.79.42 user=root ... |
2019-10-05 18:21:12 |
| 80.27.171.110 | attackspam | Oct 4 18:35:33 auw2 sshd\[11099\]: Invalid user Press@123 from 80.27.171.110 Oct 4 18:35:33 auw2 sshd\[11099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.red-80-27-171.dynamicip.rima-tde.net Oct 4 18:35:35 auw2 sshd\[11099\]: Failed password for invalid user Press@123 from 80.27.171.110 port 47518 ssh2 Oct 4 18:40:13 auw2 sshd\[11641\]: Invalid user Kim@123 from 80.27.171.110 Oct 4 18:40:13 auw2 sshd\[11641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.red-80-27-171.dynamicip.rima-tde.net |
2019-10-05 18:46:08 |
| 115.68.77.68 | attack | Oct 5 07:14:26 *** sshd[24839]: User root from 115.68.77.68 not allowed because not listed in AllowUsers |
2019-10-05 18:32:11 |
| 170.80.224.43 | attackspambots | 2019-10-05T03:45:13.910145abusebot-3.cloudsearch.cf sshd\[22235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.80.224.43 user=root |
2019-10-05 18:42:29 |
| 89.189.190.163 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-10-05 18:34:48 |
| 222.186.175.163 | attack | Oct 5 12:46:45 dedicated sshd[14201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Oct 5 12:46:47 dedicated sshd[14201]: Failed password for root from 222.186.175.163 port 49308 ssh2 |
2019-10-05 18:46:57 |
| 106.12.134.58 | attackspambots | Oct 4 18:34:41 auw2 sshd\[10997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.134.58 user=root Oct 4 18:34:43 auw2 sshd\[10997\]: Failed password for root from 106.12.134.58 port 35156 ssh2 Oct 4 18:38:41 auw2 sshd\[11369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.134.58 user=root Oct 4 18:38:43 auw2 sshd\[11369\]: Failed password for root from 106.12.134.58 port 39040 ssh2 Oct 4 18:42:51 auw2 sshd\[11889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.134.58 user=root |
2019-10-05 18:49:25 |
| 91.236.116.89 | attackspam | Oct 5 12:29:33 andromeda sshd\[41823\]: Invalid user admin from 91.236.116.89 port 54580 Oct 5 12:29:33 andromeda sshd\[41823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.236.116.89 Oct 5 12:29:35 andromeda sshd\[41823\]: Failed password for invalid user admin from 91.236.116.89 port 54580 ssh2 |
2019-10-05 18:31:20 |
| 128.199.253.133 | attack | Brute force attempt |
2019-10-05 18:35:56 |
| 148.70.4.242 | attackbotsspam | Oct 5 09:43:08 vps647732 sshd[5639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.4.242 Oct 5 09:43:10 vps647732 sshd[5639]: Failed password for invalid user P@rola_!@# from 148.70.4.242 port 53116 ssh2 ... |
2019-10-05 18:25:03 |
| 222.186.173.215 | attackbots | Oct 5 10:16:49 marvibiene sshd[18222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Oct 5 10:16:51 marvibiene sshd[18222]: Failed password for root from 222.186.173.215 port 21872 ssh2 Oct 5 10:16:55 marvibiene sshd[18222]: Failed password for root from 222.186.173.215 port 21872 ssh2 Oct 5 10:16:49 marvibiene sshd[18222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Oct 5 10:16:51 marvibiene sshd[18222]: Failed password for root from 222.186.173.215 port 21872 ssh2 Oct 5 10:16:55 marvibiene sshd[18222]: Failed password for root from 222.186.173.215 port 21872 ssh2 ... |
2019-10-05 18:26:24 |
| 183.103.61.243 | attack | Oct 5 07:04:25 www2 sshd\[5726\]: Failed password for root from 183.103.61.243 port 39930 ssh2Oct 5 07:08:54 www2 sshd\[6269\]: Failed password for root from 183.103.61.243 port 51720 ssh2Oct 5 07:13:18 www2 sshd\[6835\]: Failed password for root from 183.103.61.243 port 35286 ssh2 ... |
2019-10-05 18:19:47 |
| 106.13.38.86 | attackspambots | Oct 5 12:14:31 dev0-dcde-rnet sshd[14143]: Failed password for root from 106.13.38.86 port 42572 ssh2 Oct 5 12:19:10 dev0-dcde-rnet sshd[14153]: Failed password for root from 106.13.38.86 port 49500 ssh2 |
2019-10-05 18:24:11 |