City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.45.7.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.45.7.59. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 14:56:05 CST 2025
;; MSG SIZE rcvd: 104
Host 59.7.45.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 59.7.45.242.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 105.228.232.220 | attackbotsspam | Aug 16 16:14:13 system,error,critical: login failure for user admin from 105.228.232.220 via telnet Aug 16 16:14:15 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:17 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:22 system,error,critical: login failure for user admin from 105.228.232.220 via telnet Aug 16 16:14:24 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:26 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:31 system,error,critical: login failure for user admin from 105.228.232.220 via telnet Aug 16 16:14:33 system,error,critical: login failure for user Admin from 105.228.232.220 via telnet Aug 16 16:14:35 system,error,critical: login failure for user admin1 from 105.228.232.220 via telnet Aug 16 16:14:40 system,error,critical: login failure for user root from 105.228.232.220 via telnet |
2019-08-17 03:51:28 |
| 134.175.111.215 | attack | Aug 16 09:59:45 tdfoods sshd\[8249\]: Invalid user minecraftserver from 134.175.111.215 Aug 16 09:59:45 tdfoods sshd\[8249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 Aug 16 09:59:47 tdfoods sshd\[8249\]: Failed password for invalid user minecraftserver from 134.175.111.215 port 46906 ssh2 Aug 16 10:04:55 tdfoods sshd\[8788\]: Invalid user charles from 134.175.111.215 Aug 16 10:04:55 tdfoods sshd\[8788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 |
2019-08-17 05:44:05 |
| 91.121.101.61 | attackspambots | Aug 17 00:34:31 pkdns2 sshd\[28352\]: Invalid user otto from 91.121.101.61Aug 17 00:34:33 pkdns2 sshd\[28352\]: Failed password for invalid user otto from 91.121.101.61 port 48992 ssh2Aug 17 00:38:22 pkdns2 sshd\[28566\]: Invalid user oracle from 91.121.101.61Aug 17 00:38:25 pkdns2 sshd\[28566\]: Failed password for invalid user oracle from 91.121.101.61 port 40392 ssh2Aug 17 00:42:12 pkdns2 sshd\[28786\]: Invalid user ftp from 91.121.101.61Aug 17 00:42:14 pkdns2 sshd\[28786\]: Failed password for invalid user ftp from 91.121.101.61 port 60026 ssh2 ... |
2019-08-17 05:48:14 |
| 89.248.168.107 | attackspam | Aug 16 21:19:47 h2177944 kernel: \[4306885.191305\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=57478 PROTO=TCP SPT=44855 DPT=11491 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:20:37 h2177944 kernel: \[4306935.048295\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=56767 PROTO=TCP SPT=44844 DPT=11313 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:26:22 h2177944 kernel: \[4307279.659395\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=52452 PROTO=TCP SPT=44844 DPT=11363 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:26:35 h2177944 kernel: \[4307292.597250\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=27751 PROTO=TCP SPT=44909 DPT=11953 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:26:41 h2177944 kernel: \[4307298.539491\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85. |
2019-08-17 04:04:49 |
| 104.236.124.45 | attackbotsspam | Aug 16 09:57:00 sachi sshd\[6677\]: Invalid user teamspeak from 104.236.124.45 Aug 16 09:57:00 sachi sshd\[6677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45 Aug 16 09:57:02 sachi sshd\[6677\]: Failed password for invalid user teamspeak from 104.236.124.45 port 60308 ssh2 Aug 16 10:04:57 sachi sshd\[7396\]: Invalid user minecraft2 from 104.236.124.45 Aug 16 10:04:57 sachi sshd\[7396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45 |
2019-08-17 05:42:52 |
| 123.125.196.210 | attackspambots | 2019-08-16T20:05:00.745865abusebot-4.cloudsearch.cf sshd\[6095\]: Invalid user anathan from 123.125.196.210 port 40368 |
2019-08-17 05:39:46 |
| 134.209.99.27 | attackbotsspam | Aug 16 11:08:50 xb0 sshd[4009]: Failed password for invalid user pcgo-admin from 134.209.99.27 port 46000 ssh2 Aug 16 11:08:50 xb0 sshd[4009]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:09:14 xb0 sshd[4677]: Failed password for invalid user pcgo-admin from 134.209.99.27 port 53920 ssh2 Aug 16 11:09:14 xb0 sshd[4677]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:24:04 xb0 sshd[5108]: Failed password for invalid user hydra from 134.209.99.27 port 37798 ssh2 Aug 16 11:24:04 xb0 sshd[5108]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:24:11 xb0 sshd[7800]: Failed password for invalid user hydra from 134.209.99.27 port 43456 ssh2 Aug 16 11:24:11 xb0 sshd[7800]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:29:07 xb0 sshd[6544]: Failed password for invalid user yamamoto from 134.209.99.27 port 58964 ssh2 Aug 16 11:29:07 xb0 sshd[6544]: Received disconnect from 134.209......... ------------------------------- |
2019-08-17 03:47:16 |
| 121.78.129.147 | attackspam | Aug 16 16:49:12 aat-srv002 sshd[29373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.129.147 Aug 16 16:49:14 aat-srv002 sshd[29373]: Failed password for invalid user thelma from 121.78.129.147 port 38592 ssh2 Aug 16 16:54:04 aat-srv002 sshd[29490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.129.147 Aug 16 16:54:06 aat-srv002 sshd[29490]: Failed password for invalid user karim from 121.78.129.147 port 57266 ssh2 ... |
2019-08-17 05:55:35 |
| 103.74.123.83 | attack | Aug 16 11:34:50 friendsofhawaii sshd\[20410\]: Invalid user user1 from 103.74.123.83 Aug 16 11:34:50 friendsofhawaii sshd\[20410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83 Aug 16 11:34:52 friendsofhawaii sshd\[20410\]: Failed password for invalid user user1 from 103.74.123.83 port 33656 ssh2 Aug 16 11:40:09 friendsofhawaii sshd\[20999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.74.123.83 user=root Aug 16 11:40:10 friendsofhawaii sshd\[20999\]: Failed password for root from 103.74.123.83 port 53812 ssh2 |
2019-08-17 05:50:57 |
| 51.38.38.221 | attackbots | Aug 16 23:41:10 dedicated sshd[4065]: Invalid user jboss from 51.38.38.221 port 37177 |
2019-08-17 05:49:57 |
| 138.97.225.207 | attackspambots | failed_logins |
2019-08-17 03:44:45 |
| 165.22.254.187 | attackbotsspam | Aug 16 09:59:31 php1 sshd\[31731\]: Invalid user delete from 165.22.254.187 Aug 16 09:59:31 php1 sshd\[31731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.254.187 Aug 16 09:59:33 php1 sshd\[31731\]: Failed password for invalid user delete from 165.22.254.187 port 47840 ssh2 Aug 16 10:04:36 php1 sshd\[32162\]: Invalid user jin from 165.22.254.187 Aug 16 10:04:36 php1 sshd\[32162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.254.187 |
2019-08-17 05:52:42 |
| 121.134.159.21 | attackspam | Aug 16 19:42:03 MK-Soft-VM6 sshd\[4708\]: Invalid user zhao from 121.134.159.21 port 47172 Aug 16 19:42:03 MK-Soft-VM6 sshd\[4708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 Aug 16 19:42:06 MK-Soft-VM6 sshd\[4708\]: Failed password for invalid user zhao from 121.134.159.21 port 47172 ssh2 ... |
2019-08-17 03:47:40 |
| 107.175.56.183 | attack | Aug 16 09:18:49 aiointranet sshd\[1352\]: Invalid user quagga from 107.175.56.183 Aug 16 09:18:49 aiointranet sshd\[1352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.56.183 Aug 16 09:18:51 aiointranet sshd\[1352\]: Failed password for invalid user quagga from 107.175.56.183 port 54029 ssh2 Aug 16 09:23:24 aiointranet sshd\[1791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.56.183 user=root Aug 16 09:23:26 aiointranet sshd\[1791\]: Failed password for root from 107.175.56.183 port 50408 ssh2 |
2019-08-17 03:40:36 |
| 66.240.192.138 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-08-17 03:41:03 |