City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.250.21.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.250.21.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 22:13:12 CST 2025
;; MSG SIZE rcvd: 106
Host 149.21.250.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.21.250.42.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
61.163.2.246 | attack | Disconnected \(auth failed, 1 attempts in 7 secs\): |
2019-07-19 10:43:10 |
211.72.92.140 | attackspambots | Honeypot attack, port: 23, PTR: 211-72-92-140.HINET-IP.hinet.net. |
2019-07-19 10:32:58 |
142.93.208.158 | attackbots | 19.07.2019 02:02:44 SSH access blocked by firewall |
2019-07-19 10:35:13 |
220.130.221.140 | attack | Jul 19 02:20:52 *** sshd[8603]: Invalid user extension from 220.130.221.140 |
2019-07-19 10:26:03 |
64.202.185.111 | attackbots | Automatic report - Banned IP Access |
2019-07-19 10:39:43 |
165.227.79.177 | attackspambots | Jan 9 12:35:02 vpn sshd[21511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.79.177 Jan 9 12:35:04 vpn sshd[21511]: Failed password for invalid user win from 165.227.79.177 port 44270 ssh2 Jan 9 12:38:03 vpn sshd[21515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.79.177 |
2019-07-19 10:41:55 |
103.249.180.77 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-07-19 10:53:16 |
46.198.213.221 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-07-19 10:50:12 |
103.218.170.110 | attackspambots | Jul 19 02:21:54 MK-Soft-VM7 sshd\[23516\]: Invalid user cs from 103.218.170.110 port 37430 Jul 19 02:21:54 MK-Soft-VM7 sshd\[23516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.170.110 Jul 19 02:21:56 MK-Soft-VM7 sshd\[23516\]: Failed password for invalid user cs from 103.218.170.110 port 37430 ssh2 ... |
2019-07-19 10:29:05 |
23.224.14.34 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 19:27:37,687 INFO [amun_request_handler] PortScan Detected on Port: 445 (23.224.14.34) |
2019-07-19 10:16:21 |
78.186.159.63 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 03:04:23,961 INFO [shellcode_manager] (78.186.159.63) no match, writing hexdump (958de532759c9cc4b184c78d8f828450 :2217769) - MS17010 (EternalBlue) |
2019-07-19 10:38:34 |
186.48.0.95 | attackbotsspam | Honeypot attack, port: 81, PTR: r186-48-0-95.dialup.adsl.anteldata.net.uy. |
2019-07-19 10:51:08 |
167.114.236.38 | attackbots | Dec 18 02:25:35 vpn sshd[23260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.236.38 Dec 18 02:25:36 vpn sshd[23260]: Failed password for invalid user ventas from 167.114.236.38 port 44549 ssh2 Dec 18 02:33:37 vpn sshd[23293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.236.38 |
2019-07-19 10:07:42 |
83.4.233.172 | attackbotsspam | Automatic report - Port Scan Attack |
2019-07-19 10:11:03 |
165.227.54.251 | attackspam | Feb 23 14:21:17 vpn sshd[26329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.54.251 Feb 23 14:21:19 vpn sshd[26329]: Failed password for invalid user test4 from 165.227.54.251 port 48852 ssh2 Feb 23 14:25:20 vpn sshd[26339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.54.251 |
2019-07-19 10:49:09 |