City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.132.21.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.132.21.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 14 16:00:42 CST 2025
;; MSG SIZE rcvd: 106
Host 140.21.132.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 140.21.132.42.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 43.224.248.78 | attackspambots | WordPress XMLRPC scan :: 43.224.248.78 0.212 BYPASS [25/Jul/2019:22:33:25 1000] www.[censored_4] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0" |
2019-07-26 02:38:10 |
| 148.204.111.22 | attackspambots | Jul 25 18:49:41 tux-35-217 sshd\[4927\]: Invalid user test1 from 148.204.111.22 port 42548 Jul 25 18:49:41 tux-35-217 sshd\[4927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.111.22 Jul 25 18:49:43 tux-35-217 sshd\[4927\]: Failed password for invalid user test1 from 148.204.111.22 port 42548 ssh2 Jul 25 18:55:02 tux-35-217 sshd\[4940\]: Invalid user test from 148.204.111.22 port 48300 Jul 25 18:55:02 tux-35-217 sshd\[4940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.111.22 ... |
2019-07-26 01:43:14 |
| 147.135.195.254 | attack | Jul 25 19:44:38 SilenceServices sshd[2397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.195.254 Jul 25 19:44:39 SilenceServices sshd[2397]: Failed password for invalid user jack from 147.135.195.254 port 37438 ssh2 Jul 25 19:48:41 SilenceServices sshd[6936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.195.254 |
2019-07-26 01:50:55 |
| 193.112.160.221 | attackspambots | Jul 25 21:17:14 yabzik sshd[4768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.221 Jul 25 21:17:16 yabzik sshd[4768]: Failed password for invalid user backups from 193.112.160.221 port 55744 ssh2 Jul 25 21:22:59 yabzik sshd[6611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.160.221 |
2019-07-26 02:42:07 |
| 148.70.232.143 | attackspam | Jul 25 20:39:59 vmd17057 sshd\[10910\]: Invalid user usuario from 148.70.232.143 port 44554 Jul 25 20:39:59 vmd17057 sshd\[10910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.232.143 Jul 25 20:40:00 vmd17057 sshd\[10910\]: Failed password for invalid user usuario from 148.70.232.143 port 44554 ssh2 ... |
2019-07-26 02:43:05 |
| 212.64.14.175 | attackspam | Jul 25 19:33:03 vps691689 sshd[16743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.14.175 Jul 25 19:33:06 vps691689 sshd[16743]: Failed password for invalid user chang from 212.64.14.175 port 32876 ssh2 ... |
2019-07-26 01:58:06 |
| 167.99.38.73 | attackspambots | Jul 25 19:22:06 meumeu sshd[25778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.38.73 Jul 25 19:22:08 meumeu sshd[25778]: Failed password for invalid user owncloud from 167.99.38.73 port 46298 ssh2 Jul 25 19:26:45 meumeu sshd[25204]: Failed password for root from 167.99.38.73 port 40082 ssh2 ... |
2019-07-26 01:37:39 |
| 216.218.185.162 | attackbotsspam | Sinkhole |
2019-07-26 02:04:09 |
| 119.90.89.90 | attack | Jul 25 19:42:20 * sshd[1275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.89.90 Jul 25 19:42:22 * sshd[1275]: Failed password for invalid user bertrand from 119.90.89.90 port 50700 ssh2 |
2019-07-26 02:24:54 |
| 79.137.46.233 | attack | WordPress wp-login brute force :: 79.137.46.233 0.044 BYPASS [26/Jul/2019:03:21:58 1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-07-26 02:26:57 |
| 167.114.3.105 | attackspambots | 2019-07-25T16:20:04.886915hub.schaetter.us sshd\[28706\]: Invalid user ftpuser from 167.114.3.105 2019-07-25T16:20:04.945206hub.schaetter.us sshd\[28706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.ip-167-114-3.net 2019-07-25T16:20:07.016349hub.schaetter.us sshd\[28706\]: Failed password for invalid user ftpuser from 167.114.3.105 port 58024 ssh2 2019-07-25T16:25:20.781531hub.schaetter.us sshd\[28743\]: Invalid user daniela from 167.114.3.105 2019-07-25T16:25:20.827785hub.schaetter.us sshd\[28743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.ip-167-114-3.net ... |
2019-07-26 02:40:41 |
| 92.54.27.143 | attackbots | Jul 25 14:09:32 srv1 postfix/smtpd[5241]: connect from heimdall.emailfirewall.spamina.com[92.54.27.143] Jul 25 14:09:33 srv1 postfix/smtpd[5241]: Anonymous TLS connection established from heimdall.emailfirewall.spamina.com[92.54.27.143]: TLSv1.2 whostnameh cipher DHE-RSA-AES256-SHA256 (256/256 bhostnames) Jul x@x Jul 25 14:09:39 srv1 postfix/smtpd[5241]: disconnect from heimdall.emailfirewall.spamina.com[92.54.27.143] Jul 25 14:37:00 srv1 postfix/smtpd[13240]: connect from heimdall.emailfirewall.spamina.com[92.54.27.143] Jul 25 14:37:01 srv1 postfix/smtpd[13240]: Anonymous TLS connection established from heimdall.emailfirewall.spamina.com[92.54.27.143]: TLSv1.2 whostnameh cipher DHE-RSA-AES256-SHA256 (256/256 bhostnames) Jul x@x Jul 25 14:37:06 srv1 postfix/smtpd[13240]: disconnect from heimdall.emailfirewall.spamina.com[92.54.27.143] Jul 25 14:37:42 srv1 postfix/smtpd[13221]: connect from heimdall.emailfirewall.spamina.com[92.54.27.143] Jul 25 14:37:42 srv1 postfix/smt........ ------------------------------- |
2019-07-26 02:37:25 |
| 80.237.68.228 | attackspam | Jul 25 20:09:57 legacy sshd[25852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.237.68.228 Jul 25 20:10:00 legacy sshd[25852]: Failed password for invalid user rcmoharana from 80.237.68.228 port 39434 ssh2 Jul 25 20:14:46 legacy sshd[25968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.237.68.228 ... |
2019-07-26 02:35:43 |
| 123.31.20.81 | attackbots | 123.31.20.81 - - [25/Jul/2019:16:36:12 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 123.31.20.81 - - [25/Jul/2019:16:36:13 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 123.31.20.81 - - [25/Jul/2019:16:36:14 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 123.31.20.81 - - [25/Jul/2019:16:36:15 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 123.31.20.81 - - [25/Jul/2019:16:36:16 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 123.31.20.81 - - [25/Jul/2019:16:36:17 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-26 02:05:52 |
| 134.209.100.31 | attackspambots | Jul 25 18:41:47 fr01 sshd[9861]: Invalid user mariana from 134.209.100.31 ... |
2019-07-26 01:48:55 |