City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.172.209.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.172.209.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025033101 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 01 18:49:24 CST 2025
;; MSG SIZE rcvd: 108
Host 142.209.172.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.209.172.242.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
111.26.20.2 | attack | RDP Brute-Force (Grieskirchen RZ2) |
2019-12-09 08:21:39 |
222.186.175.212 | attackbotsspam | 2019-12-09T01:12:42.525208centos sshd\[30613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root 2019-12-09T01:12:44.159923centos sshd\[30613\]: Failed password for root from 222.186.175.212 port 35640 ssh2 2019-12-09T01:12:47.562237centos sshd\[30613\]: Failed password for root from 222.186.175.212 port 35640 ssh2 |
2019-12-09 08:27:21 |
94.23.204.136 | attackbots | Dec 8 13:53:52 tdfoods sshd\[2877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364702.ip-94-23-204.eu user=root Dec 8 13:53:54 tdfoods sshd\[2877\]: Failed password for root from 94.23.204.136 port 55352 ssh2 Dec 8 13:59:05 tdfoods sshd\[3434\]: Invalid user shiflett from 94.23.204.136 Dec 8 13:59:05 tdfoods sshd\[3434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364702.ip-94-23-204.eu Dec 8 13:59:07 tdfoods sshd\[3434\]: Failed password for invalid user shiflett from 94.23.204.136 port 35806 ssh2 |
2019-12-09 08:06:45 |
104.248.94.159 | attack | Dec 9 00:10:16 localhost sshd[44996]: Failed password for invalid user acount from 104.248.94.159 port 36458 ssh2 Dec 9 00:20:34 localhost sshd[47204]: Failed password for invalid user mysql from 104.248.94.159 port 55694 ssh2 Dec 9 00:26:07 localhost sshd[48493]: Failed password for invalid user webmaster from 104.248.94.159 port 36776 ssh2 |
2019-12-09 07:57:38 |
195.28.79.22 | attack | 2019-12-09T00:12:57.009506abusebot.cloudsearch.cf sshd\[3808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.28.79.22 user=root |
2019-12-09 08:17:15 |
116.203.41.127 | attack | Automatic report - XMLRPC Attack |
2019-12-09 08:04:43 |
52.74.240.239 | attackspambots | 2019-12-08T23:36:05.215260abusebot-7.cloudsearch.cf sshd\[6372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-74-240-239.ap-southeast-1.compute.amazonaws.com user=root |
2019-12-09 07:58:32 |
104.248.65.180 | attack | Dec 9 04:40:29 vibhu-HP-Z238-Microtower-Workstation sshd\[11474\]: Invalid user chan from 104.248.65.180 Dec 9 04:40:29 vibhu-HP-Z238-Microtower-Workstation sshd\[11474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180 Dec 9 04:40:31 vibhu-HP-Z238-Microtower-Workstation sshd\[11474\]: Failed password for invalid user chan from 104.248.65.180 port 37158 ssh2 Dec 9 04:46:12 vibhu-HP-Z238-Microtower-Workstation sshd\[11857\]: Invalid user elisabeth from 104.248.65.180 Dec 9 04:46:12 vibhu-HP-Z238-Microtower-Workstation sshd\[11857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180 ... |
2019-12-09 07:55:59 |
14.215.165.131 | attackbots | Dec 9 00:29:56 legacy sshd[30187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.165.131 Dec 9 00:29:58 legacy sshd[30187]: Failed password for invalid user bridgit from 14.215.165.131 port 50524 ssh2 Dec 9 00:36:16 legacy sshd[30625]: Failed password for root from 14.215.165.131 port 56192 ssh2 ... |
2019-12-09 07:55:30 |
159.203.74.227 | attackbots | Dec 8 13:48:23 eddieflores sshd\[28952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.74.227 user=root Dec 8 13:48:25 eddieflores sshd\[28952\]: Failed password for root from 159.203.74.227 port 42538 ssh2 Dec 8 13:53:37 eddieflores sshd\[29460\]: Invalid user auker from 159.203.74.227 Dec 8 13:53:37 eddieflores sshd\[29460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.74.227 Dec 8 13:53:39 eddieflores sshd\[29460\]: Failed password for invalid user auker from 159.203.74.227 port 49548 ssh2 |
2019-12-09 08:06:21 |
104.151.234.212 | attackspambots | Wordpress XMLRPC attack |
2019-12-09 08:14:24 |
52.32.115.8 | attackspam | 12/09/2019-00:50:02.852668 52.32.115.8 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-12-09 08:05:27 |
104.177.180.24 | attackbots | Dec 9 01:12:49 herz-der-gamer sshd[683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.177.180.24 user=backup Dec 9 01:12:51 herz-der-gamer sshd[683]: Failed password for backup from 104.177.180.24 port 54870 ssh2 ... |
2019-12-09 08:22:07 |
194.152.206.93 | attackspam | Dec 9 00:41:25 eventyay sshd[5036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93 Dec 9 00:41:27 eventyay sshd[5036]: Failed password for invalid user rumeno from 194.152.206.93 port 56180 ssh2 Dec 9 00:50:06 eventyay sshd[5356]: Failed password for nobody from 194.152.206.93 port 60890 ssh2 ... |
2019-12-09 08:07:18 |
160.153.234.236 | attackspambots | Dec 9 05:09:30 gw1 sshd[4455]: Failed password for mysql from 160.153.234.236 port 52002 ssh2 ... |
2019-12-09 08:17:47 |