City: Central
Region: Central and Western District
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: HKT Limited
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.61.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57478
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.2.61.55. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 09 21:23:30 +08 2019
;; MSG SIZE rcvd: 114
55.61.2.42.in-addr.arpa domain name pointer 42-2-61-055.static.netvigator.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
55.61.2.42.in-addr.arpa name = 42-2-61-055.static.netvigator.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.142.120.33 | attack | Attempted Brute Force (dovecot) |
2020-10-06 13:41:01 |
118.129.34.166 | attackspambots | 20 attempts against mh-ssh on echoip |
2020-10-06 13:32:51 |
36.148.12.251 | attack | Oct 5 23:13:09 [host] sshd[9259]: pam_unix(sshd:a Oct 5 23:13:11 [host] sshd[9259]: Failed password Oct 5 23:17:51 [host] sshd[9379]: pam_unix(sshd:a |
2020-10-06 13:52:24 |
125.124.120.123 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-06T00:10:21Z and 2020-10-06T00:17:34Z |
2020-10-06 14:05:07 |
112.85.42.47 | attackspam | Oct 6 05:56:25 scw-6657dc sshd[29334]: Failed password for root from 112.85.42.47 port 2172 ssh2 Oct 6 05:56:25 scw-6657dc sshd[29334]: Failed password for root from 112.85.42.47 port 2172 ssh2 Oct 6 05:56:28 scw-6657dc sshd[29334]: Failed password for root from 112.85.42.47 port 2172 ssh2 ... |
2020-10-06 14:08:47 |
14.115.30.10 | attack | Lines containing failures of 14.115.30.10 (max 1000) Oct 5 20:54:45 mxbb sshd[22191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.115.30.10 user=r.r Oct 5 20:54:47 mxbb sshd[22191]: Failed password for r.r from 14.115.30.10 port 52142 ssh2 Oct 5 20:54:47 mxbb sshd[22191]: Received disconnect from 14.115.30.10 port 52142:11: Bye Bye [preauth] Oct 5 20:54:47 mxbb sshd[22191]: Disconnected from 14.115.30.10 port 52142 [preauth] Oct 5 21:02:07 mxbb sshd[22364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.115.30.10 user=r.r Oct 5 21:02:09 mxbb sshd[22364]: Failed password for r.r from 14.115.30.10 port 53004 ssh2 Oct 5 21:02:09 mxbb sshd[22364]: Received disconnect from 14.115.30.10 port 53004:11: Bye Bye [preauth] Oct 5 21:02:09 mxbb sshd[22364]: Disconnected from 14.115.30.10 port 53004 [preauth] Oct 5 21:04:36 mxbb sshd[22435]: pam_unix(sshd:auth): authentication failur........ ------------------------------ |
2020-10-06 14:13:30 |
220.78.28.68 | attack | $f2bV_matches |
2020-10-06 14:02:20 |
14.161.6.201 | attackbots | Automatic report - Banned IP Access |
2020-10-06 13:54:48 |
106.12.94.119 | attackbotsspam | Oct 5 15:07:08 UTC__SANYALnet-Labs__cac14 sshd[16087]: Connection from 106.12.94.119 port 45806 on 64.137.176.112 port 22 Oct 5 15:07:12 UTC__SANYALnet-Labs__cac14 sshd[16087]: User r.r from 106.12.94.119 not allowed because not listed in AllowUsers Oct 5 15:07:12 UTC__SANYALnet-Labs__cac14 sshd[16087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.94.119 user=r.r Oct 5 15:07:14 UTC__SANYALnet-Labs__cac14 sshd[16087]: Failed password for invalid user r.r from 106.12.94.119 port 45806 ssh2 Oct 5 15:07:15 UTC__SANYALnet-Labs__cac14 sshd[16087]: Received disconnect from 106.12.94.119: 11: Bye Bye [preauth] Oct 5 15:23:44 UTC__SANYALnet-Labs__cac14 sshd[16441]: Connection from 106.12.94.119 port 35906 on 64.137.176.112 port 22 Oct 5 15:23:47 UTC__SANYALnet-Labs__cac14 sshd[16441]: User r.r from 106.12.94.119 not allowed because not listed in AllowUsers Oct 5 15:23:47 UTC__SANYALnet-Labs__cac14 sshd[16441]: pam_unix(s........ ------------------------------- |
2020-10-06 13:48:12 |
117.213.67.250 | attack | Port scan on 1 port(s): 445 |
2020-10-06 14:07:46 |
212.112.126.85 | attackspambots | $f2bV_matches |
2020-10-06 13:48:33 |
103.254.209.201 | attackspam | Oct 6 06:54:33 * sshd[29105]: Failed password for root from 103.254.209.201 port 50878 ssh2 |
2020-10-06 13:42:06 |
139.59.25.82 | attack | Oct 5 19:03:48 host sshd[10598]: User r.r from 139.59.25.82 not allowed because none of user's groups are listed in AllowGroups Oct 5 19:03:48 host sshd[10598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.82 user=r.r Oct 5 19:03:50 host sshd[10598]: Failed password for invalid user r.r from 139.59.25.82 port 46410 ssh2 Oct 5 19:03:51 host sshd[10598]: Received disconnect from 139.59.25.82 port 46410:11: Bye Bye [preauth] Oct 5 19:03:51 host sshd[10598]: Disconnected from invalid user r.r 139.59.25.82 port 46410 [preauth] Oct 5 19:18:43 host sshd[11134]: User r.r from 139.59.25.82 not allowed because none of user's groups are listed in AllowGroups Oct 5 19:18:43 host sshd[11134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.82 user=r.r Oct 5 19:18:45 host sshd[11134]: Failed password for invalid user r.r from 139.59.25.82 port 45422 ssh2 Oct 5 19:18:46 ho........ ------------------------------- |
2020-10-06 13:53:15 |
218.92.0.165 | attackspambots | Oct 6 11:06:16 lunarastro sshd[17707]: Failed password for root from 218.92.0.165 port 7438 ssh2 Oct 6 11:06:20 lunarastro sshd[17707]: Failed password for root from 218.92.0.165 port 7438 ssh2 |
2020-10-06 13:38:56 |
112.85.42.173 | attack | Oct 6 07:50:12 marvibiene sshd[12356]: Failed password for root from 112.85.42.173 port 52402 ssh2 Oct 6 07:50:18 marvibiene sshd[12356]: Failed password for root from 112.85.42.173 port 52402 ssh2 |
2020-10-06 13:59:10 |