City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.97.104.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;29.97.104.41. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:38:34 CST 2025
;; MSG SIZE rcvd: 105
Host 41.104.97.29.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 41.104.97.29.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 80.82.77.139 | attackbotsspam | 22.06.2019 17:44:57 Connection to port 13 blocked by firewall |
2019-06-23 02:29:58 |
| 58.242.83.36 | attackbots | Jun 22 12:19:57 aat-srv002 sshd[10457]: Failed password for root from 58.242.83.36 port 58471 ssh2 Jun 22 12:35:25 aat-srv002 sshd[10649]: Failed password for root from 58.242.83.36 port 32481 ssh2 Jun 22 12:36:03 aat-srv002 sshd[10658]: Failed password for root from 58.242.83.36 port 63062 ssh2 ... |
2019-06-23 01:47:32 |
| 185.173.35.13 | attackspam | 22.06.2019 14:41:38 Connection to port 1026 blocked by firewall |
2019-06-23 02:31:33 |
| 41.33.199.2 | attack | 445/tcp 445/tcp [2019-06-22]2pkt |
2019-06-23 01:48:39 |
| 177.191.19.229 | attackspambots | 445/tcp [2019-06-22]1pkt |
2019-06-23 02:20:44 |
| 162.158.126.53 | attack | 8080/tcp 8080/tcp 8080/tcp... [2019-06-22]4pkt,1pt.(tcp) |
2019-06-23 01:44:33 |
| 171.236.71.3 | attackspam | 445/tcp [2019-06-22]1pkt |
2019-06-23 02:19:05 |
| 191.53.220.196 | attackbots | Try access to SMTP/POP/IMAP server. |
2019-06-23 02:33:37 |
| 128.199.221.18 | attackbots | Jun 22 08:16:51 Ubuntu-1404-trusty-64-minimal sshd\[21410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.221.18 user=root Jun 22 08:16:54 Ubuntu-1404-trusty-64-minimal sshd\[21410\]: Failed password for root from 128.199.221.18 port 43899 ssh2 Jun 22 19:38:05 Ubuntu-1404-trusty-64-minimal sshd\[27037\]: Invalid user apache from 128.199.221.18 Jun 22 19:38:05 Ubuntu-1404-trusty-64-minimal sshd\[27037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.221.18 Jun 22 19:38:07 Ubuntu-1404-trusty-64-minimal sshd\[27037\]: Failed password for invalid user apache from 128.199.221.18 port 41391 ssh2 |
2019-06-23 02:02:11 |
| 177.39.103.98 | attack | SASL Brute Force |
2019-06-23 01:47:01 |
| 187.94.118.212 | attackspambots | IP: 187.94.118.212 ASN: AS28322 Mar Internet Provider Ltda. Port: World Wide Web HTTP 80 Found in one or more Blacklists Date: 22/06/2019 2:42:52 PM UTC |
2019-06-23 01:45:13 |
| 1.169.195.63 | attackbotsspam | 5555/tcp [2019-06-22]1pkt |
2019-06-23 02:31:17 |
| 45.125.65.96 | attackbotsspam | Jun 22 17:42:23 postfix/smtpd: warning: unknown[45.125.65.96]: SASL LOGIN authentication failed |
2019-06-23 02:31:00 |
| 31.46.16.95 | attackspambots | Jun 22 17:26:17 vps65 sshd\[24068\]: Invalid user jian from 31.46.16.95 port 57846 Jun 22 17:26:17 vps65 sshd\[24068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.16.95 ... |
2019-06-23 02:24:34 |
| 58.244.110.248 | attack | 5500/tcp [2019-06-22]1pkt |
2019-06-23 01:52:48 |