City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.21.45.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.21.45.113. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 00:44:39 CST 2025
;; MSG SIZE rcvd: 105
Host 113.45.21.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 113.45.21.42.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 68.183.155.33 | attackbots | Mar 1 20:32:27 webhost01 sshd[10614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.155.33 Mar 1 20:32:29 webhost01 sshd[10614]: Failed password for invalid user jose from 68.183.155.33 port 36208 ssh2 ... |
2020-03-01 23:21:51 |
| 51.75.27.78 | attackbots | Mar 1 16:29:13 lukav-desktop sshd\[8123\]: Invalid user steam from 51.75.27.78 Mar 1 16:29:13 lukav-desktop sshd\[8123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.27.78 Mar 1 16:29:16 lukav-desktop sshd\[8123\]: Failed password for invalid user steam from 51.75.27.78 port 40758 ssh2 Mar 1 16:35:43 lukav-desktop sshd\[8214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.27.78 user=bin Mar 1 16:35:45 lukav-desktop sshd\[8214\]: Failed password for bin from 51.75.27.78 port 35450 ssh2 |
2020-03-01 23:22:03 |
| 80.82.64.124 | attack | Mar 1 08:25:15 ast sshd[17951]: Invalid user pi from 80.82.64.124 port 21372 Mar 1 08:25:17 ast sshd[17951]: error: PAM: Authentication failure for illegal user pi from 80.82.64.124 Mar 1 08:25:15 ast sshd[17951]: Invalid user pi from 80.82.64.124 port 21372 Mar 1 08:25:17 ast sshd[17951]: error: PAM: Authentication failure for illegal user pi from 80.82.64.124 Mar 1 08:25:15 ast sshd[17951]: Invalid user pi from 80.82.64.124 port 21372 Mar 1 08:25:17 ast sshd[17951]: error: PAM: Authentication failure for illegal user pi from 80.82.64.124 Mar 1 08:25:17 ast sshd[17951]: Failed keyboard-interactive/pam for invalid user pi from 80.82.64.124 port 21372 ssh2 ... |
2020-03-01 22:54:29 |
| 222.186.175.202 | attackbotsspam | Mar 1 16:09:51 sd-53420 sshd\[27692\]: User root from 222.186.175.202 not allowed because none of user's groups are listed in AllowGroups Mar 1 16:09:53 sd-53420 sshd\[27692\]: Failed none for invalid user root from 222.186.175.202 port 41662 ssh2 Mar 1 16:09:53 sd-53420 sshd\[27692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Mar 1 16:09:56 sd-53420 sshd\[27692\]: Failed password for invalid user root from 222.186.175.202 port 41662 ssh2 Mar 1 16:09:59 sd-53420 sshd\[27692\]: Failed password for invalid user root from 222.186.175.202 port 41662 ssh2 ... |
2020-03-01 23:11:01 |
| 194.6.233.219 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-01 23:31:34 |
| 104.248.7.8 | attackspam | As always with digital ocean |
2020-03-01 23:06:34 |
| 222.186.30.76 | attackbots | 2020-03-02T02:21:29.461871luisaranguren sshd[2934491]: Failed password for root from 222.186.30.76 port 48452 ssh2 2020-03-02T02:21:34.728734luisaranguren sshd[2934491]: Failed password for root from 222.186.30.76 port 48452 ssh2 ... |
2020-03-01 23:29:54 |
| 219.73.47.69 | attackspambots | Honeypot attack, port: 5555, PTR: n219073047069.netvigator.com. |
2020-03-01 23:33:33 |
| 185.130.59.48 | attackspambots | [munged]::443 185.130.59.48 - - [01/Mar/2020:16:08:18 +0100] "POST /[munged]: HTTP/1.1" 200 6800 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-03-01 23:14:12 |
| 186.88.225.194 | attackbotsspam | Honeypot attack, port: 445, PTR: 186-88-225-194.genericrev.cantv.net. |
2020-03-01 22:54:10 |
| 189.8.68.56 | attackspam | Mar 1 14:25:20 v22018076622670303 sshd\[16236\]: Invalid user deluge from 189.8.68.56 port 58604 Mar 1 14:25:20 v22018076622670303 sshd\[16236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.8.68.56 Mar 1 14:25:22 v22018076622670303 sshd\[16236\]: Failed password for invalid user deluge from 189.8.68.56 port 58604 ssh2 ... |
2020-03-01 22:45:13 |
| 45.143.221.48 | attackspambots | firewall-block, port(s): 5060/udp |
2020-03-01 23:07:48 |
| 5.148.3.212 | attackbots | Mar 1 22:15:50 webhost01 sshd[13052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212 Mar 1 22:15:52 webhost01 sshd[13052]: Failed password for invalid user ftp from 5.148.3.212 port 46357 ssh2 ... |
2020-03-01 23:25:18 |
| 80.82.70.239 | attackspambots | firewall-block, port(s): 3435/tcp, 3438/tcp, 3445/tcp, 3457/tcp, 3459/tcp |
2020-03-01 22:41:05 |
| 120.244.236.67 | attackspambots | Mar 1 16:12:46 lnxweb61 sshd[28074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.236.67 |
2020-03-01 23:23:35 |