City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 246.21.110.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;246.21.110.149. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011100 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 16:34:05 CST 2025
;; MSG SIZE rcvd: 107
Host 149.110.21.246.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.110.21.246.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
139.99.219.208 | attackspambots | Invalid user wanglj from 139.99.219.208 port 58809 |
2020-09-04 19:45:06 |
45.235.93.14 | attackspambots | Sep 3 18:40:28 nuernberg-4g-01 sshd[17149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.93.14 Sep 3 18:40:30 nuernberg-4g-01 sshd[17149]: Failed password for invalid user jader from 45.235.93.14 port 20380 ssh2 Sep 3 18:42:44 nuernberg-4g-01 sshd[17855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.93.14 |
2020-09-04 19:42:24 |
185.228.228.166 | attack | Sep 3 18:42:48 mellenthin postfix/smtpd[20267]: NOQUEUE: reject: RCPT from unknown[185.228.228.166]: 554 5.7.1 Service unavailable; Client host [185.228.228.166] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/185.228.228.166; from= |
2020-09-04 19:36:35 |
41.41.222.61 | attack | Honeypot attack, port: 445, PTR: host-41.41.222.61.tedata.net. |
2020-09-04 19:57:22 |
197.248.10.108 | attack | Sep 3 18:26:04 gamehost-one sshd[22697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.10.108 Sep 3 18:26:06 gamehost-one sshd[22697]: Failed password for invalid user sysadmin from 197.248.10.108 port 57110 ssh2 Sep 3 18:42:16 gamehost-one sshd[23926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.10.108 ... |
2020-09-04 19:59:05 |
84.17.47.110 | attackspam | (From turbomavro@gmail.com) The leader in short-term investing in the cryptocurrency market. The leader in payments for the affiliate program. Investment program: Investment currency: BTC. The investment period is 2 days. Minimum profit is 10% Registration here: https://bit.ly/3gr3l6q Get + 10% every 2 days to your personal Bitcoin wallet in addition to your balance. For example: invest 0.1 bitcoins today, in 2 days you will receive 0.11 bitcoins in your personal bitcoin wallet. The best affiliate program - a real find for MLM agents 5% for the referral of the first level (direct registration) 3% for the referral of the second level 1% for the referral of the third level Referral bonuses are paid the next day after the referral donation. The bonus goes to your BTC address the day after the novice's donation. Any reinvestment of participants, the leader receives a full bonus! Registration here: https://bit.ly/3gr3l6q |
2020-09-04 20:01:25 |
118.76.188.43 | attackspambots | Portscan detected |
2020-09-04 20:04:13 |
127.0.0.1 | attack | Test Connectivity |
2020-09-04 19:31:11 |
62.105.159.6 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 19:51:11 |
187.151.250.22 | attackbotsspam | Honeypot attack, port: 445, PTR: dsl-187-151-250-22-dyn.prod-infinitum.com.mx. |
2020-09-04 20:01:58 |
185.110.242.209 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 19:44:41 |
139.199.23.233 | attackbotsspam | $f2bV_matches |
2020-09-04 19:59:25 |
140.143.57.195 | attack | Sep 4 11:54:57 vm1 sshd[1663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.195 Sep 4 11:54:58 vm1 sshd[1663]: Failed password for invalid user jsa from 140.143.57.195 port 54488 ssh2 ... |
2020-09-04 20:14:24 |
37.187.20.60 | attack | Sep 4 10:48:44 ns37 sshd[4722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.20.60 |
2020-09-04 19:57:46 |
174.217.9.21 | attackbotsspam | Brute forcing email accounts |
2020-09-04 19:55:36 |