City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.128.201.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.128.201.241.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:12:03 CST 2025
;; MSG SIZE  rcvd: 108
        Host 241.201.128.242.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 241.201.128.242.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 194.226.129.86 | attack | Lines containing failures of 194.226.129.86 May 18 18:27:08 *** sshd[68367]: Did not receive identification string from 194.226.129.86 port 35494 May 18 18:28:44 *** sshd[68713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.226.129.86 user=r.r May 18 18:28:46 *** sshd[68713]: Failed password for r.r from 194.226.129.86 port 47728 ssh2 May 18 18:28:46 *** sshd[68713]: Received disconnect from 194.226.129.86 port 47728:11: Normal Shutdown, Thank you for playing [preauth] May 18 18:28:46 *** sshd[68713]: Disconnected from authenticating user r.r 194.226.129.86 port 47728 [preauth] May 18 18:29:32 *** sshd[68819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.226.129.86 user=r.r May 18 18:29:33 *** sshd[68819]: Failed password for r.r from 194.226.129.86 port 60556 ssh2 May 18 18:29:33 *** sshd[68819]: Received disconnect from 194.226.129.86 port 60556:11: Normal Shutdown, Thank yo........ ------------------------------  | 
                    2020-05-20 00:25:11 | 
| 159.65.41.159 | attack | 2020-05-19T11:45:32.799274scmdmz1 sshd[18643]: Invalid user vgt from 159.65.41.159 port 58442 2020-05-19T11:45:34.369720scmdmz1 sshd[18643]: Failed password for invalid user vgt from 159.65.41.159 port 58442 ssh2 2020-05-19T11:53:39.875348scmdmz1 sshd[19666]: Invalid user qlh from 159.65.41.159 port 60998 ...  | 
                    2020-05-20 00:24:48 | 
| 180.76.138.132 | attackspambots | May 19 11:54:16 lnxmail61 sshd[12002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.138.132  | 
                    2020-05-20 00:15:19 | 
| 96.77.182.189 | attack | Too many connections or unauthorized access detected from Arctic banned ip  | 
                    2020-05-20 00:14:04 | 
| 202.137.10.186 | attack | 2020-05-19T15:55:04.557798shield sshd\[21418\]: Invalid user sxe from 202.137.10.186 port 44064 2020-05-19T15:55:04.570624shield sshd\[21418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.10.186 2020-05-19T15:55:06.635212shield sshd\[21418\]: Failed password for invalid user sxe from 202.137.10.186 port 44064 ssh2 2020-05-19T15:59:39.328816shield sshd\[22074\]: Invalid user jtl from 202.137.10.186 port 48792 2020-05-19T15:59:39.338057shield sshd\[22074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.10.186  | 
                    2020-05-20 00:14:23 | 
| 222.116.70.13 | attackspambots | port scan and connect, tcp 23 (telnet)  | 
                    2020-05-20 00:11:26 | 
| 168.194.207.58 | attackbots | Invalid user qru from 168.194.207.58 port 53820  | 
                    2020-05-20 00:26:50 | 
| 78.118.109.44 | attackspambots | $f2bV_matches  | 
                    2020-05-20 00:51:29 | 
| 185.234.219.224 | attackspambots | May 19 18:15:32 ns3042688 courier-pop3d: LOGIN FAILED, user=test@makita-dolmar.com, ip=\[::ffff:185.234.219.224\] ...  | 
                    2020-05-20 00:34:21 | 
| 118.24.200.40 | attackspambots | SSH authentication failure x 6 reported by Fail2Ban ...  | 
                    2020-05-20 00:30:32 | 
| 185.220.101.35 | attackbots | Scanning WordPress forms  | 
                    2020-05-20 00:14:58 | 
| 106.13.105.88 | attackspambots | Invalid user ndy from 106.13.105.88 port 48736 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.88 Failed password for invalid user ndy from 106.13.105.88 port 48736 ssh2 Invalid user we from 106.13.105.88 port 46492 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.88  | 
                    2020-05-20 00:39:28 | 
| 209.97.171.56 | attackbots | Portscan or hack attempt detected by psad/fwsnort  | 
                    2020-05-20 00:21:35 | 
| 124.118.64.67 | attackbots | [18/May/2020:16:56:25 +0200] "POST /HNAP1/ HTTP/1.0"  | 
                    2020-05-20 00:54:50 | 
| 106.12.119.218 | attackspambots | Invalid user lkw from 106.12.119.218 port 48412  | 
                    2020-05-20 01:02:17 |