City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.162.6.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.162.6.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:02:12 CST 2025
;; MSG SIZE rcvd: 106
Host 150.6.162.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.6.162.242.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.169.194 | attackspambots | 2019-12-06T06:32:35.167472homeassistant sshd[11401]: Failed password for root from 222.186.169.194 port 10874 ssh2 2019-12-06T15:37:14.355665homeassistant sshd[14873]: Failed none for root from 222.186.169.194 port 19142 ssh2 ... |
2019-12-06 23:45:12 |
| 159.203.197.31 | attackspam | 2019-12-06 04:37:28 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=[159.203.197.31] input="EHLO zg-0911a-85 " |
2019-12-06 23:32:32 |
| 45.80.64.246 | attackspambots | Dec 6 14:46:55 vtv3 sshd[10550]: Failed password for root from 45.80.64.246 port 37384 ssh2 Dec 6 14:52:55 vtv3 sshd[13332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246 Dec 6 14:52:57 vtv3 sshd[13332]: Failed password for invalid user christy from 45.80.64.246 port 44764 ssh2 Dec 6 15:06:10 vtv3 sshd[19816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246 Dec 6 15:06:12 vtv3 sshd[19816]: Failed password for invalid user www from 45.80.64.246 port 59516 ssh2 Dec 6 15:12:14 vtv3 sshd[22519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246 Dec 6 15:23:53 vtv3 sshd[27954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246 Dec 6 15:23:55 vtv3 sshd[27954]: Failed password for invalid user admin from 45.80.64.246 port 53166 ssh2 Dec 6 15:29:50 vtv3 sshd[30803]: pam_unix(sshd:auth): authenticat |
2019-12-06 23:11:23 |
| 124.156.139.104 | attackspam | Dec 6 16:38:44 sd-53420 sshd\[21424\]: Invalid user hune from 124.156.139.104 Dec 6 16:38:44 sd-53420 sshd\[21424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.139.104 Dec 6 16:38:47 sd-53420 sshd\[21424\]: Failed password for invalid user hune from 124.156.139.104 port 33112 ssh2 Dec 6 16:44:46 sd-53420 sshd\[22527\]: Invalid user guest from 124.156.139.104 Dec 6 16:44:46 sd-53420 sshd\[22527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.139.104 ... |
2019-12-06 23:52:06 |
| 101.108.216.88 | attack | 1575643874 - 12/06/2019 15:51:14 Host: 101.108.216.88/101.108.216.88 Port: 6667 TCP Blocked |
2019-12-06 23:19:41 |
| 187.18.108.73 | attack | 2019-12-06T15:26:44.547827hub.schaetter.us sshd\[5083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r237-pw-guarapo.ibys.com.br user=mysql 2019-12-06T15:26:51.090639hub.schaetter.us sshd\[5083\]: Failed password for mysql from 187.18.108.73 port 39804 ssh2 2019-12-06T15:33:45.501164hub.schaetter.us sshd\[5178\]: Invalid user hammes from 187.18.108.73 port 45365 2019-12-06T15:33:45.552825hub.schaetter.us sshd\[5178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=r237-pw-guarapo.ibys.com.br 2019-12-06T15:33:47.581329hub.schaetter.us sshd\[5178\]: Failed password for invalid user hammes from 187.18.108.73 port 45365 ssh2 ... |
2019-12-06 23:51:24 |
| 143.255.185.159 | attackbots | 23/tcp [2019-12-06]1pkt |
2019-12-06 23:17:20 |
| 178.217.173.54 | attackspambots | Dec 6 15:44:31 vps666546 sshd\[8949\]: Invalid user rpc from 178.217.173.54 port 60990 Dec 6 15:44:31 vps666546 sshd\[8949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 Dec 6 15:44:33 vps666546 sshd\[8949\]: Failed password for invalid user rpc from 178.217.173.54 port 60990 ssh2 Dec 6 15:51:05 vps666546 sshd\[9085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 user=root Dec 6 15:51:07 vps666546 sshd\[9085\]: Failed password for root from 178.217.173.54 port 43058 ssh2 ... |
2019-12-06 23:23:21 |
| 186.52.112.172 | attackbots | Automatic report - Port Scan Attack |
2019-12-06 23:48:30 |
| 5.173.244.14 | attackbots | TCP Port Scanning |
2019-12-06 23:39:56 |
| 207.248.62.98 | attack | F2B jail: sshd. Time: 2019-12-06 16:39:27, Reported by: VKReport |
2019-12-06 23:45:45 |
| 35.183.60.188 | attackbots | 35.183.60.188 - - \[06/Dec/2019:13:54:22 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/65.0.3325.181 Safari/537.36" 35.183.60.188 - - \[06/Dec/2019:14:51:23 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/65.0.3325.181 Safari/537.36" ... |
2019-12-06 23:12:24 |
| 178.62.28.79 | attack | 2019-12-06T15:24:52.982238abusebot-5.cloudsearch.cf sshd\[27143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79 user=root |
2019-12-06 23:28:54 |
| 103.245.181.2 | attack | Dec 6 15:05:47 web8 sshd\[27441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.181.2 user=root Dec 6 15:05:49 web8 sshd\[27441\]: Failed password for root from 103.245.181.2 port 33672 ssh2 Dec 6 15:12:56 web8 sshd\[30740\]: Invalid user admin from 103.245.181.2 Dec 6 15:12:56 web8 sshd\[30740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.181.2 Dec 6 15:12:58 web8 sshd\[30740\]: Failed password for invalid user admin from 103.245.181.2 port 38174 ssh2 |
2019-12-06 23:15:09 |
| 116.203.203.73 | attackspambots | Dec 6 17:47:21 server sshd\[2282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.73.203.203.116.clients.your-server.de user=root Dec 6 17:47:23 server sshd\[2282\]: Failed password for root from 116.203.203.73 port 57194 ssh2 Dec 6 17:53:14 server sshd\[3909\]: Invalid user hospital from 116.203.203.73 Dec 6 17:53:14 server sshd\[3909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.73.203.203.116.clients.your-server.de Dec 6 17:53:15 server sshd\[3909\]: Failed password for invalid user hospital from 116.203.203.73 port 47904 ssh2 ... |
2019-12-06 23:27:30 |