City: Columbus
Region: Ohio
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.21.138.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.21.138.42. IN A
;; AUTHORITY SECTION:
. 213 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023012500 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 25 22:40:43 CST 2023
;; MSG SIZE rcvd: 104
42.138.21.3.in-addr.arpa domain name pointer ec2-3-21-138-42.us-east-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.138.21.3.in-addr.arpa name = ec2-3-21-138-42.us-east-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
209.97.129.231 | attack | xmlrpc attack |
2019-12-25 22:32:11 |
35.233.37.172 | attack | Automatic report - XMLRPC Attack |
2019-12-25 22:46:10 |
112.166.141.161 | attack | SSH/22 MH Probe, BF, Hack - |
2019-12-25 23:06:05 |
154.66.219.20 | attackspam | Dec 25 15:57:29 tuxlinux sshd[26323]: Invalid user audy from 154.66.219.20 port 59776 Dec 25 15:57:29 tuxlinux sshd[26323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20 Dec 25 15:57:29 tuxlinux sshd[26323]: Invalid user audy from 154.66.219.20 port 59776 Dec 25 15:57:29 tuxlinux sshd[26323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20 Dec 25 15:57:29 tuxlinux sshd[26323]: Invalid user audy from 154.66.219.20 port 59776 Dec 25 15:57:29 tuxlinux sshd[26323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20 Dec 25 15:57:32 tuxlinux sshd[26323]: Failed password for invalid user audy from 154.66.219.20 port 59776 ssh2 ... |
2019-12-25 22:58:34 |
221.1.157.181 | attack | Scanning |
2019-12-25 22:54:22 |
142.93.174.47 | attackspambots | Dec 25 12:49:56 vmd26974 sshd[872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.174.47 Dec 25 12:49:57 vmd26974 sshd[872]: Failed password for invalid user stoughton from 142.93.174.47 port 44182 ssh2 ... |
2019-12-25 22:49:36 |
114.67.74.139 | attack | Dec 25 09:57:31 plusreed sshd[16610]: Invalid user innocuous from 114.67.74.139 ... |
2019-12-25 22:59:16 |
58.50.131.25 | attack | [portscan] tcp/21 [FTP] [scan/connect: 3 time(s)] *(RWIN=65535)(12251243) |
2019-12-25 22:34:26 |
113.53.232.245 | attackspam | Dec 25 15:53:18 silence02 sshd[31242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.53.232.245 Dec 25 15:53:19 silence02 sshd[31242]: Failed password for invalid user rigoni from 113.53.232.245 port 53846 ssh2 Dec 25 15:57:23 silence02 sshd[31339]: Failed password for root from 113.53.232.245 port 41368 ssh2 |
2019-12-25 23:03:35 |
198.108.67.33 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2019-12-25 22:53:29 |
122.201.19.99 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2019-12-25 22:37:45 |
195.154.154.89 | attackbotsspam | 195.154.154.89 - - [25/Dec/2019:07:16:20 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.154.154.89 - - [25/Dec/2019:07:16:20 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.154.154.89 - - [25/Dec/2019:07:16:26 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.154.154.89 - - [25/Dec/2019:07:16:46 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.154.154.89 - - [25/Dec/2019:07:17:06 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.154.154.89 - - [25/Dec/2019:07:17:37 +0100] "POST /wp-login.php HTTP/1.1" 200 1439 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-12-25 22:43:45 |
134.175.6.69 | attackbotsspam | Invalid user kare from 134.175.6.69 port 46278 |
2019-12-25 22:42:42 |
190.187.104.146 | attack | Dec 25 15:25:27 sd-53420 sshd\[12941\]: Invalid user webb from 190.187.104.146 Dec 25 15:25:27 sd-53420 sshd\[12941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.104.146 Dec 25 15:25:28 sd-53420 sshd\[12941\]: Failed password for invalid user webb from 190.187.104.146 port 51786 ssh2 Dec 25 15:29:08 sd-53420 sshd\[14183\]: Invalid user steenbergen from 190.187.104.146 Dec 25 15:29:08 sd-53420 sshd\[14183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.187.104.146 ... |
2019-12-25 22:47:42 |
103.114.104.245 | attackspam | Dec 25 15:57:18 debian-2gb-nbg1-2 kernel: \[938572.474315\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.114.104.245 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=39580 PROTO=TCP SPT=53179 DPT=14474 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-12-25 23:07:15 |