City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.167.117.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.167.117.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:40:40 CST 2025
;; MSG SIZE rcvd: 105
42.117.167.3.in-addr.arpa domain name pointer server-3-167-117-42.iad55.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.117.167.3.in-addr.arpa name = server-3-167-117-42.iad55.r.cloudfront.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.177.122.132 | attackspam | Port scan and direct access per IP instead of hostname |
2019-08-09 18:10:22 |
| 51.38.131.1 | attackbotsspam | $f2bV_matches |
2019-08-09 17:29:13 |
| 128.1.138.97 | attackbots | Aug 9 10:37:06 microserver sshd[45145]: Invalid user mn from 128.1.138.97 port 56950 Aug 9 10:37:06 microserver sshd[45145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.138.97 Aug 9 10:37:08 microserver sshd[45145]: Failed password for invalid user mn from 128.1.138.97 port 56950 ssh2 Aug 9 10:42:05 microserver sshd[45831]: Invalid user tool from 128.1.138.97 port 52470 Aug 9 10:42:05 microserver sshd[45831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.138.97 Aug 9 10:56:29 microserver sshd[47819]: Invalid user waldemar from 128.1.138.97 port 38690 Aug 9 10:56:29 microserver sshd[47819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.138.97 Aug 9 10:56:31 microserver sshd[47819]: Failed password for invalid user waldemar from 128.1.138.97 port 38690 ssh2 Aug 9 11:01:31 microserver sshd[48488]: Invalid user marketing from 128.1.138.97 port 34088 Aug 9 11:0 |
2019-08-09 17:46:25 |
| 103.114.107.128 | attackbotsspam | >40 unauthorized SSH connections |
2019-08-09 17:10:42 |
| 51.75.124.76 | attackbots | Aug 9 10:04:50 eventyay sshd[10299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.124.76 Aug 9 10:04:53 eventyay sshd[10299]: Failed password for invalid user sakai from 51.75.124.76 port 57162 ssh2 Aug 9 10:08:51 eventyay sshd[11039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.124.76 ... |
2019-08-09 17:41:40 |
| 92.118.160.9 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-09 17:59:54 |
| 158.69.220.70 | attackspam | Aug 9 01:27:32 cac1d2 sshd\[22757\]: Invalid user backupadmin from 158.69.220.70 port 45934 Aug 9 01:27:32 cac1d2 sshd\[22757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.220.70 Aug 9 01:27:35 cac1d2 sshd\[22757\]: Failed password for invalid user backupadmin from 158.69.220.70 port 45934 ssh2 ... |
2019-08-09 17:28:30 |
| 117.218.197.250 | attack | firewall-block, port(s): 445/tcp |
2019-08-09 17:54:09 |
| 198.108.66.101 | attack | 47808/udp 27017/tcp 591/tcp... [2019-06-19/08-09]8pkt,6pt.(tcp),1pt.(udp) |
2019-08-09 17:24:36 |
| 212.142.140.81 | attack | Aug 9 11:52:15 meumeu sshd[8783]: Failed password for invalid user hscroot from 212.142.140.81 port 44532 ssh2 Aug 9 11:56:46 meumeu sshd[9315]: Failed password for invalid user home from 212.142.140.81 port 39584 ssh2 Aug 9 12:01:20 meumeu sshd[10164]: Failed password for invalid user admin from 212.142.140.81 port 34540 ssh2 ... |
2019-08-09 18:08:50 |
| 165.22.224.226 | attackspambots | SSHScan |
2019-08-09 17:22:48 |
| 103.89.90.87 | attack | >40 unauthorized SSH connections |
2019-08-09 17:12:43 |
| 159.65.183.47 | attack | Aug 9 11:08:07 debian sshd\[13240\]: Invalid user manager from 159.65.183.47 port 41238 Aug 9 11:08:07 debian sshd\[13240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47 ... |
2019-08-09 18:09:57 |
| 111.35.122.78 | attackspambots | 2323/tcp [2019-08-09]1pkt |
2019-08-09 18:02:18 |
| 160.168.1.250 | attackbotsspam | firewall-block, port(s): 5555/tcp |
2019-08-09 17:36:16 |