City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.21.142.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.21.142.245. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 11:32:51 CST 2025
;; MSG SIZE rcvd: 106
245.142.21.47.in-addr.arpa domain name pointer ool-2f158ef5.static.optonline.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.142.21.47.in-addr.arpa name = ool-2f158ef5.static.optonline.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
49.234.126.244 | attack | Invalid user tester from 49.234.126.244 port 55822 |
2020-09-24 04:58:36 |
191.217.110.202 | attackbotsspam | bruteforce detected |
2020-09-24 04:39:04 |
222.186.173.154 | attack | 2020-09-23T22:17:12.450658vps773228.ovh.net sshd[19184]: Failed password for root from 222.186.173.154 port 49670 ssh2 2020-09-23T22:17:15.751130vps773228.ovh.net sshd[19184]: Failed password for root from 222.186.173.154 port 49670 ssh2 2020-09-23T22:17:18.599087vps773228.ovh.net sshd[19184]: Failed password for root from 222.186.173.154 port 49670 ssh2 2020-09-23T22:17:21.387456vps773228.ovh.net sshd[19184]: Failed password for root from 222.186.173.154 port 49670 ssh2 2020-09-23T22:17:25.261154vps773228.ovh.net sshd[19184]: Failed password for root from 222.186.173.154 port 49670 ssh2 ... |
2020-09-24 04:31:48 |
124.137.205.59 | attack | Sep 23 22:58:11 mx sshd[912182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.137.205.59 Sep 23 22:58:11 mx sshd[912182]: Invalid user aaron from 124.137.205.59 port 15554 Sep 23 22:58:13 mx sshd[912182]: Failed password for invalid user aaron from 124.137.205.59 port 15554 ssh2 Sep 23 23:02:47 mx sshd[912238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.137.205.59 user=root Sep 23 23:02:49 mx sshd[912238]: Failed password for root from 124.137.205.59 port 44839 ssh2 ... |
2020-09-24 04:59:37 |
52.243.94.243 | attackspam | 2020-09-23T16:15:39.212456mail.thespaminator.com sshd[14049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.243.94.243 user=root 2020-09-23T16:15:41.351703mail.thespaminator.com sshd[14049]: Failed password for root from 52.243.94.243 port 33688 ssh2 ... |
2020-09-24 04:48:34 |
52.233.43.113 | attack | Sep 23 21:40:45 ns382633 sshd\[20748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.233.43.113 user=root Sep 23 21:40:45 ns382633 sshd\[20747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.233.43.113 user=root Sep 23 21:40:47 ns382633 sshd\[20748\]: Failed password for root from 52.233.43.113 port 39531 ssh2 Sep 23 21:40:47 ns382633 sshd\[20747\]: Failed password for root from 52.233.43.113 port 39510 ssh2 Sep 23 22:23:42 ns382633 sshd\[29093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.233.43.113 user=root |
2020-09-24 04:35:02 |
36.155.113.40 | attack | Sep 23 19:09:52 game-panel sshd[28986]: Failed password for root from 36.155.113.40 port 56741 ssh2 Sep 23 19:15:17 game-panel sshd[29222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.40 Sep 23 19:15:19 game-panel sshd[29222]: Failed password for invalid user lucia from 36.155.113.40 port 56986 ssh2 |
2020-09-24 04:54:18 |
139.198.18.230 | attackspam | Sep 23 20:56:21 ns3033917 sshd[15917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.18.230 Sep 23 20:56:20 ns3033917 sshd[15917]: Invalid user mailtest from 139.198.18.230 port 45582 Sep 23 20:56:23 ns3033917 sshd[15917]: Failed password for invalid user mailtest from 139.198.18.230 port 45582 ssh2 ... |
2020-09-24 05:04:39 |
45.7.196.77 | attackbots | Invalid user debian from 45.7.196.77 port 59150 |
2020-09-24 04:59:08 |
140.210.90.197 | attackspambots | Sep 23 19:31:31 inter-technics sshd[26812]: Invalid user bitrix from 140.210.90.197 port 41196 Sep 23 19:31:31 inter-technics sshd[26812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.90.197 Sep 23 19:31:31 inter-technics sshd[26812]: Invalid user bitrix from 140.210.90.197 port 41196 Sep 23 19:31:34 inter-technics sshd[26812]: Failed password for invalid user bitrix from 140.210.90.197 port 41196 ssh2 Sep 23 19:34:06 inter-technics sshd[26908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.90.197 user=root Sep 23 19:34:08 inter-technics sshd[26908]: Failed password for root from 140.210.90.197 port 46426 ssh2 ... |
2020-09-24 04:48:15 |
49.145.194.23 | attackbots | 20/9/23@13:05:14: FAIL: Alarm-Network address from=49.145.194.23 ... |
2020-09-24 04:37:07 |
13.71.16.51 | attackbots | (sshd) Failed SSH login from 13.71.16.51 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 16:22:29 optimus sshd[10969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.16.51 user=root Sep 23 16:22:29 optimus sshd[10970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.16.51 user=root Sep 23 16:22:29 optimus sshd[10973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.16.51 user=root Sep 23 16:22:29 optimus sshd[10974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.16.51 user=root Sep 23 16:22:29 optimus sshd[10975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.16.51 user=root |
2020-09-24 04:36:50 |
111.68.98.152 | attackbotsspam | Sep 23 13:55:25 ws22vmsma01 sshd[238354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152 Sep 23 13:55:27 ws22vmsma01 sshd[238354]: Failed password for invalid user sagar from 111.68.98.152 port 58842 ssh2 Sep 23 14:07:38 ws22vmsma01 sshd[47267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152 Sep 23 14:07:40 ws22vmsma01 sshd[47267]: Failed password for invalid user test from 111.68.98.152 port 42150 ssh2 Sep 23 14:14:16 ws22vmsma01 sshd[76964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152 Sep 23 14:14:17 ws22vmsma01 sshd[76964]: Failed password for invalid user opc from 111.68.98.152 port 43222 ssh2 ... |
2020-09-24 04:53:56 |
51.83.33.88 | attack | Sep 23 19:20:51 XXXXXX sshd[25564]: Invalid user user from 51.83.33.88 port 53242 |
2020-09-24 04:43:00 |
223.17.93.47 | attackspam | Sep 22 08:00:20 www sshd[13196]: reveeclipse mapping checking getaddrinfo for 47-93-17-223-on-nets.com [223.17.93.47] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 22 08:00:20 www sshd[13196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.17.93.47 user=r.r Sep 22 08:00:22 www sshd[13196]: Failed password for r.r from 223.17.93.47 port 57466 ssh2 Sep 22 08:00:22 www sshd[13196]: Connection closed by 223.17.93.47 [preauth] Sep 23 19:01:01 www sshd[13680]: reveeclipse mapping checking getaddrinfo for 47-93-17-223-on-nets.com [223.17.93.47] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 23 19:01:01 www sshd[13680]: Invalid user admin from 223.17.93.47 Sep 23 19:01:01 www sshd[13680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.17.93.47 Sep 23 19:01:04 www sshd[13680]: Failed password for invalid user admin from 223.17.93.47 port 43674 ssh2 Sep 23 19:01:04 www sshd[13712]: reveeclipse mapping ........ ------------------------------- |
2020-09-24 04:54:46 |