City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.73.218.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.73.218.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032000 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 20 23:16:20 CST 2025
;; MSG SIZE rcvd: 106
Host 81.218.73.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.218.73.242.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
198.27.80.123 | attack | [Tue Dec 31 02:53:20.335745 2019] [:error] [pid 24191] [client 198.27.80.123:64977] script '/var/www/www.periodicos.unifra.br/wp-config.bak.php' not found or unable to stat, referer: http://www.google.com.hk [Tue Dec 31 02:55:25.653872 2019] [:error] [pid 24187] [client 198.27.80.123:55186] script '/var/www/www.periodicos.unifra.br/wpconfig.bak.php' not found or unable to stat, referer: http://www.google.com.hk [Tue Dec 31 02:55:40.495782 2019] [:error] [pid 24200] [client 198.27.80.123:51279] script '/var/www/www.periodicos.unifra.br/wpconfigbak.php' not found or unable to stat, referer: http://www.google.com.hk ... |
2019-12-31 13:52:28 |
159.65.180.64 | attack | IP blocked |
2019-12-31 14:22:20 |
216.218.206.83 | attackspambots | Dec 31 06:38:34 debian-2gb-nbg1-2 kernel: \[30049.770631\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=216.218.206.83 DST=195.201.40.59 LEN=68 TOS=0x00 PREC=0x00 TTL=52 ID=837 DF PROTO=UDP SPT=9488 DPT=111 LEN=48 |
2019-12-31 13:53:18 |
222.186.180.17 | attackbotsspam | Dec 31 07:19:35 Ubuntu-1404-trusty-64-minimal sshd\[2046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Dec 31 07:19:36 Ubuntu-1404-trusty-64-minimal sshd\[2046\]: Failed password for root from 222.186.180.17 port 9074 ssh2 Dec 31 07:19:53 Ubuntu-1404-trusty-64-minimal sshd\[2209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Dec 31 07:19:55 Ubuntu-1404-trusty-64-minimal sshd\[2209\]: Failed password for root from 222.186.180.17 port 22330 ssh2 Dec 31 07:20:04 Ubuntu-1404-trusty-64-minimal sshd\[2209\]: Failed password for root from 222.186.180.17 port 22330 ssh2 |
2019-12-31 14:20:44 |
61.0.152.71 | attackbotsspam | 1577768143 - 12/31/2019 05:55:43 Host: 61.0.152.71/61.0.152.71 Port: 445 TCP Blocked |
2019-12-31 13:58:53 |
77.247.108.238 | attackbotsspam | Dec 31 05:55:35 debian-2gb-nbg1-2 kernel: \[27470.668579\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.238 DST=195.201.40.59 LEN=444 TOS=0x00 PREC=0x00 TTL=51 ID=57243 DF PROTO=UDP SPT=5253 DPT=50601 LEN=424 |
2019-12-31 14:03:16 |
35.160.48.160 | attack | 12/31/2019-06:18:02.650057 35.160.48.160 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-12-31 13:48:24 |
203.114.102.69 | attackbots | Invalid user zarnecki from 203.114.102.69 port 56914 |
2019-12-31 14:27:19 |
36.230.234.88 | attack | 1577768135 - 12/31/2019 05:55:35 Host: 36.230.234.88/36.230.234.88 Port: 445 TCP Blocked |
2019-12-31 14:03:45 |
79.143.44.122 | attackbots | Invalid user rpm from 79.143.44.122 port 42670 |
2019-12-31 14:04:47 |
138.99.6.65 | attack | Dec 31 00:31:23 server sshd\[12801\]: Invalid user vestrum from 138.99.6.65 Dec 31 00:31:23 server sshd\[12801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.99.6.65 Dec 31 00:31:25 server sshd\[12801\]: Failed password for invalid user vestrum from 138.99.6.65 port 58436 ssh2 Dec 31 07:55:54 server sshd\[21881\]: Invalid user user1 from 138.99.6.65 Dec 31 07:55:54 server sshd\[21881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.99.6.65 ... |
2019-12-31 13:51:58 |
185.176.27.118 | attackspambots | Dec 31 07:00:57 mc1 kernel: \[1930842.161356\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.118 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=4097 PROTO=TCP SPT=43120 DPT=8162 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 31 07:02:42 mc1 kernel: \[1930947.236421\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.118 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54070 PROTO=TCP SPT=43120 DPT=8227 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 31 07:03:01 mc1 kernel: \[1930965.501833\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.118 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=29148 PROTO=TCP SPT=43120 DPT=50183 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-12-31 14:13:07 |
139.199.164.21 | attack | Dec 31 02:58:19 vps46666688 sshd[32011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.21 Dec 31 02:58:21 vps46666688 sshd[32011]: Failed password for invalid user tecnico from 139.199.164.21 port 55688 ssh2 ... |
2019-12-31 14:07:42 |
222.186.175.154 | attackbots | 2019-12-31T06:52:45.281726centos sshd\[15566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root 2019-12-31T06:52:46.961869centos sshd\[15566\]: Failed password for root from 222.186.175.154 port 30196 ssh2 2019-12-31T06:52:50.037544centos sshd\[15566\]: Failed password for root from 222.186.175.154 port 30196 ssh2 |
2019-12-31 14:02:46 |
165.22.35.21 | attackspambots | Automatic report - XMLRPC Attack |
2019-12-31 14:13:26 |