City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.196.171.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;245.196.171.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 05:25:05 CST 2025
;; MSG SIZE rcvd: 107
Host 42.171.196.245.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.171.196.245.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.53.48.53 | attackbotsspam | Unauthorised access (Oct 8) SRC=42.53.48.53 LEN=40 TTL=49 ID=31754 TCP DPT=8080 WINDOW=64406 SYN Unauthorised access (Oct 8) SRC=42.53.48.53 LEN=40 TTL=49 ID=982 TCP DPT=8080 WINDOW=64406 SYN Unauthorised access (Oct 8) SRC=42.53.48.53 LEN=40 TTL=49 ID=59520 TCP DPT=8080 WINDOW=13037 SYN Unauthorised access (Oct 7) SRC=42.53.48.53 LEN=40 TTL=49 ID=59780 TCP DPT=8080 WINDOW=13037 SYN Unauthorised access (Oct 6) SRC=42.53.48.53 LEN=40 TTL=49 ID=62794 TCP DPT=8080 WINDOW=64406 SYN |
2019-10-08 15:17:26 |
| 111.6.78.158 | attackbots | Aug 10 21:38:14 dallas01 sshd[8507]: Failed password for root from 111.6.78.158 port 25181 ssh2 Aug 10 21:38:17 dallas01 sshd[8507]: Failed password for root from 111.6.78.158 port 25181 ssh2 Aug 10 21:38:19 dallas01 sshd[8507]: Failed password for root from 111.6.78.158 port 25181 ssh2 |
2019-10-08 15:18:39 |
| 207.154.206.212 | attack | Oct 8 06:51:48 www5 sshd\[58410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212 user=root Oct 8 06:51:50 www5 sshd\[58410\]: Failed password for root from 207.154.206.212 port 39010 ssh2 Oct 8 06:55:33 www5 sshd\[59014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212 user=root ... |
2019-10-08 15:18:00 |
| 89.248.162.247 | attackspam | 10/08/2019-00:14:38.377140 89.248.162.247 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-08 14:49:52 |
| 111.67.204.4 | attackspambots | Sep 3 08:11:53 dallas01 sshd[26885]: Failed password for invalid user nagios from 111.67.204.4 port 38405 ssh2 Sep 3 08:15:49 dallas01 sshd[27531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.204.4 Sep 3 08:15:51 dallas01 sshd[27531]: Failed password for invalid user apples from 111.67.204.4 port 33020 ssh2 |
2019-10-08 14:58:09 |
| 176.31.140.35 | attackbots | Oct 8 06:56:36 game-panel sshd[17778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.140.35 Oct 8 06:56:38 game-panel sshd[17778]: Failed password for invalid user deploy from 176.31.140.35 port 56952 ssh2 Oct 8 06:59:28 game-panel sshd[17845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.140.35 |
2019-10-08 15:08:26 |
| 83.144.105.158 | attackspambots | 2019-10-08T06:30:01.359227abusebot-5.cloudsearch.cf sshd\[32148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.beltrade.pl user=root |
2019-10-08 14:59:17 |
| 45.55.80.186 | attack | Feb 24 18:43:38 vtv3 sshd\[4018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.80.186 user=root Feb 24 18:43:39 vtv3 sshd\[4018\]: Failed password for root from 45.55.80.186 port 41737 ssh2 Feb 24 18:47:49 vtv3 sshd\[5497\]: Invalid user ftpadmin from 45.55.80.186 port 59137 Feb 24 18:47:49 vtv3 sshd\[5497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.80.186 Feb 24 18:47:51 vtv3 sshd\[5497\]: Failed password for invalid user ftpadmin from 45.55.80.186 port 59137 ssh2 Mar 2 06:03:20 vtv3 sshd\[5549\]: Invalid user ansible from 45.55.80.186 port 52622 Mar 2 06:03:20 vtv3 sshd\[5549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.80.186 Mar 2 06:03:22 vtv3 sshd\[5549\]: Failed password for invalid user ansible from 45.55.80.186 port 52622 ssh2 Mar 2 06:09:30 vtv3 sshd\[7552\]: Invalid user minecraft from 45.55.80.186 port 41703 Mar 2 06:09:30 vtv3 ss |
2019-10-08 15:20:47 |
| 5.196.75.178 | attackspambots | 2019-10-08T06:49:11.950030abusebot-3.cloudsearch.cf sshd\[11742\]: Invalid user qwe\#@! from 5.196.75.178 port 49252 |
2019-10-08 14:55:29 |
| 54.38.185.87 | attackspam | Oct 8 08:57:35 SilenceServices sshd[21641]: Failed password for root from 54.38.185.87 port 37636 ssh2 Oct 8 09:01:44 SilenceServices sshd[22761]: Failed password for root from 54.38.185.87 port 55852 ssh2 |
2019-10-08 15:08:12 |
| 51.254.38.106 | attackspam | Oct 8 07:11:07 www sshd\[59658\]: Invalid user P@rola12\# from 51.254.38.106Oct 8 07:11:09 www sshd\[59658\]: Failed password for invalid user P@rola12\# from 51.254.38.106 port 37031 ssh2Oct 8 07:14:56 www sshd\[59735\]: Invalid user Set123 from 51.254.38.106 ... |
2019-10-08 15:07:45 |
| 111.68.97.59 | attack | Sep 23 16:20:43 dallas01 sshd[12201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.97.59 Sep 23 16:20:45 dallas01 sshd[12201]: Failed password for invalid user prueba from 111.68.97.59 port 53597 ssh2 Sep 23 16:25:43 dallas01 sshd[12876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.97.59 |
2019-10-08 14:56:14 |
| 183.131.82.99 | attackspambots | Oct 8 08:58:39 vmanager6029 sshd\[11006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99 user=root Oct 8 08:58:41 vmanager6029 sshd\[11006\]: Failed password for root from 183.131.82.99 port 61573 ssh2 Oct 8 08:58:43 vmanager6029 sshd\[11006\]: Failed password for root from 183.131.82.99 port 61573 ssh2 |
2019-10-08 15:00:47 |
| 193.112.58.149 | attack | Oct 7 20:36:27 tdfoods sshd\[12137\]: Invalid user cent0s2018 from 193.112.58.149 Oct 7 20:36:27 tdfoods sshd\[12137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.149 Oct 7 20:36:29 tdfoods sshd\[12137\]: Failed password for invalid user cent0s2018 from 193.112.58.149 port 60384 ssh2 Oct 7 20:42:36 tdfoods sshd\[12810\]: Invalid user P@\$\$wort0101 from 193.112.58.149 Oct 7 20:42:36 tdfoods sshd\[12810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.149 |
2019-10-08 14:51:44 |
| 62.89.206.226 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 08-10-2019 04:55:36. |
2019-10-08 15:20:27 |