City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.97.63.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.97.63.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:47:37 CST 2025
;; MSG SIZE rcvd: 105
Host 19.63.97.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 19.63.97.242.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.144.215.146 | attackbotsspam | Unauthorized connection attempt detected from IP address 192.144.215.146 to port 4920 [T] |
2020-09-02 18:17:37 |
| 190.207.49.148 | attackbotsspam | Port probing on unauthorized port 445 |
2020-09-02 18:29:06 |
| 106.12.148.170 | attack | Jul 2 19:32:56 ms-srv sshd[6759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.170 Jul 2 19:32:58 ms-srv sshd[6759]: Failed password for invalid user akhan from 106.12.148.170 port 49004 ssh2 |
2020-09-02 18:38:34 |
| 50.62.177.206 | attackbotsspam | REQUESTED PAGE: /xmlrpc.php |
2020-09-02 18:08:10 |
| 115.74.246.147 | attackbotsspam | 1598978475 - 09/01/2020 18:41:15 Host: 115.74.246.147/115.74.246.147 Port: 445 TCP Blocked |
2020-09-02 18:36:15 |
| 129.226.138.179 | attackbotsspam | Invalid user cash from 129.226.138.179 port 40808 |
2020-09-02 18:06:26 |
| 45.164.8.244 | attackspam | Sep 2 13:27:42 pkdns2 sshd\[20493\]: Invalid user terry from 45.164.8.244Sep 2 13:27:43 pkdns2 sshd\[20493\]: Failed password for invalid user terry from 45.164.8.244 port 46116 ssh2Sep 2 13:31:35 pkdns2 sshd\[20666\]: Invalid user ali from 45.164.8.244Sep 2 13:31:37 pkdns2 sshd\[20666\]: Failed password for invalid user ali from 45.164.8.244 port 51532 ssh2Sep 2 13:35:42 pkdns2 sshd\[20859\]: Invalid user pokus from 45.164.8.244Sep 2 13:35:44 pkdns2 sshd\[20859\]: Failed password for invalid user pokus from 45.164.8.244 port 56948 ssh2 ... |
2020-09-02 18:37:42 |
| 186.219.211.193 | attackspambots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-09-02 18:30:31 |
| 112.120.204.47 | attackbots | (sshd) Failed SSH login from 112.120.204.47 (HK/Hong Kong/North/Kwu Tung/n112120204047.netvigator.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 1 12:41:19 atlas sshd[29151]: Invalid user admin from 112.120.204.47 port 59527 Sep 1 12:41:21 atlas sshd[29151]: Failed password for invalid user admin from 112.120.204.47 port 59527 ssh2 Sep 1 12:41:22 atlas sshd[29163]: Invalid user admin from 112.120.204.47 port 59616 Sep 1 12:41:25 atlas sshd[29163]: Failed password for invalid user admin from 112.120.204.47 port 59616 ssh2 Sep 1 12:41:27 atlas sshd[29170]: Invalid user admin from 112.120.204.47 port 59740 |
2020-09-02 18:21:26 |
| 167.172.214.147 | attackbots | (sshd) Failed SSH login from 167.172.214.147 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 2 04:48:03 server sshd[13989]: Invalid user xt from 167.172.214.147 port 40140 Sep 2 04:48:05 server sshd[13989]: Failed password for invalid user xt from 167.172.214.147 port 40140 ssh2 Sep 2 04:48:08 server sshd[13995]: Invalid user xt from 167.172.214.147 port 41870 Sep 2 04:48:10 server sshd[13995]: Failed password for invalid user xt from 167.172.214.147 port 41870 ssh2 Sep 2 04:57:51 server sshd[16622]: Invalid user svaadmin from 167.172.214.147 port 40988 |
2020-09-02 18:46:54 |
| 94.102.51.33 | attack | Persistent port scanning [13 denied] |
2020-09-02 18:05:43 |
| 165.227.15.223 | attackspambots | 165.227.15.223 - - [02/Sep/2020:11:43:08 +0100] "POST /wp-login.php HTTP/1.1" 200 2255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.227.15.223 - - [02/Sep/2020:11:43:10 +0100] "POST /wp-login.php HTTP/1.1" 200 2230 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.227.15.223 - - [02/Sep/2020:11:43:11 +0100] "POST /wp-login.php HTTP/1.1" 200 2235 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-02 18:43:41 |
| 31.173.82.171 | attack | 1598978491 - 09/01/2020 18:41:31 Host: 31.173.82.171/31.173.82.171 Port: 445 TCP Blocked |
2020-09-02 18:26:55 |
| 41.65.182.230 | attackspambots | 1598978509 - 09/01/2020 18:41:49 Host: 41.65.182.230/41.65.182.230 Port: 445 TCP Blocked |
2020-09-02 18:11:33 |
| 106.54.221.104 | attackbots | Mar 29 21:21:22 ms-srv sshd[19705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.221.104 Mar 29 21:21:24 ms-srv sshd[19705]: Failed password for invalid user ifi from 106.54.221.104 port 41582 ssh2 |
2020-09-02 18:45:35 |