City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.75.142.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.75.142.86. IN A
;; AUTHORITY SECTION:
. 318 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 18:21:34 CST 2022
;; MSG SIZE rcvd: 105
Host 86.142.75.49.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 86.142.75.49.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
178.62.117.82 | attack | Jul 30 03:14:15 MK-Soft-VM6 sshd\[18472\]: Invalid user dev from 178.62.117.82 port 51564 Jul 30 03:14:15 MK-Soft-VM6 sshd\[18472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.117.82 Jul 30 03:14:18 MK-Soft-VM6 sshd\[18472\]: Failed password for invalid user dev from 178.62.117.82 port 51564 ssh2 ... |
2019-07-30 11:54:24 |
202.131.126.142 | attack | Jul 30 04:57:18 dedicated sshd[19415]: Invalid user rao from 202.131.126.142 port 34144 |
2019-07-30 11:13:06 |
91.224.60.75 | attackbotsspam | 2019-07-30T03:35:17.772557abusebot-6.cloudsearch.cf sshd\[10261\]: Invalid user tomcat from 91.224.60.75 port 40903 |
2019-07-30 11:50:44 |
217.32.246.90 | attackspambots | Jul 30 07:13:30 www4 sshd\[28700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.32.246.90 user=root Jul 30 07:13:32 www4 sshd\[28700\]: Failed password for root from 217.32.246.90 port 58438 ssh2 Jul 30 07:18:14 www4 sshd\[29204\]: Invalid user alexander from 217.32.246.90 Jul 30 07:18:14 www4 sshd\[29204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.32.246.90 Jul 30 07:18:17 www4 sshd\[29204\]: Failed password for invalid user alexander from 217.32.246.90 port 52868 ssh2 ... |
2019-07-30 12:22:08 |
219.142.135.106 | attackspambots | 21/tcp 21/tcp 21/tcp... [2019-07-11/29]4pkt,1pt.(tcp) |
2019-07-30 11:35:22 |
5.8.75.20 | attackbots | Jul 30 04:27:59 mail kernel: \[1714920.726012\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=5.8.75.20 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=27649 DF PROTO=TCP SPT=58766 DPT=8088 WINDOW=29200 RES=0x00 SYN URGP=0 Jul 30 04:28:00 mail kernel: \[1714921.723920\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=5.8.75.20 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=27650 DF PROTO=TCP SPT=58766 DPT=8088 WINDOW=29200 RES=0x00 SYN URGP=0 Jul 30 04:28:01 mail kernel: \[1714921.924357\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=5.8.75.20 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=38853 DF PROTO=TCP SPT=44352 DPT=7002 WINDOW=29200 RES=0x00 SYN URGP=0 |
2019-07-30 11:19:09 |
115.72.5.100 | attackspam | Jul 29 18:46:01 mxgate1 postfix/postscreen[17672]: CONNECT from [115.72.5.100]:57478 to [176.31.12.44]:25 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17863]: addr 115.72.5.100 listed by domain zen.spamhaus.org as 127.0.0.11 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17863]: addr 115.72.5.100 listed by domain zen.spamhaus.org as 127.0.0.4 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17863]: addr 115.72.5.100 listed by domain zen.spamhaus.org as 127.0.0.3 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17862]: addr 115.72.5.100 listed by domain cbl.abuseat.org as 127.0.0.2 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17865]: addr 115.72.5.100 listed by domain bl.spamcop.net as 127.0.0.2 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17866]: addr 115.72.5.100 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jul 29 18:46:01 mxgate1 postfix/dnsblog[17864]: addr 115.72.5.100 listed by domain b.barracudacentral.org as 127.0.0.2 Jul 29 18:46:02 mxgate1 postfix/postscreen[17672]: PREGREET 21 after 0.56 from [........ ------------------------------- |
2019-07-30 11:27:20 |
181.115.149.6 | attackspambots | 445/tcp 445/tcp 445/tcp... [2019-06-24/07-29]11pkt,1pt.(tcp) |
2019-07-30 11:51:16 |
212.64.44.69 | attackbotsspam | Jul 29 23:11:55 xtremcommunity sshd\[16334\]: Invalid user kathy from 212.64.44.69 port 53124 Jul 29 23:11:55 xtremcommunity sshd\[16334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.44.69 Jul 29 23:11:57 xtremcommunity sshd\[16334\]: Failed password for invalid user kathy from 212.64.44.69 port 53124 ssh2 Jul 29 23:17:24 xtremcommunity sshd\[16546\]: Invalid user certificat from 212.64.44.69 port 48554 Jul 29 23:17:24 xtremcommunity sshd\[16546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.44.69 ... |
2019-07-30 11:33:00 |
180.248.23.220 | attack | Automatic report - Port Scan Attack |
2019-07-30 11:19:40 |
46.101.244.118 | attackbots | Jul 30 04:33:54 localhost sshd\[3842\]: Invalid user arkserver from 46.101.244.118 port 50584 Jul 30 04:33:54 localhost sshd\[3842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.244.118 ... |
2019-07-30 11:34:38 |
148.244.76.45 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-06-11/07-28]15pkt,1pt.(tcp) |
2019-07-30 11:14:08 |
73.161.112.2 | attackspambots | Jul 30 09:21:12 lcl-usvr-01 sshd[4158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.161.112.2 user=root Jul 30 09:21:13 lcl-usvr-01 sshd[4158]: Failed password for root from 73.161.112.2 port 55994 ssh2 Jul 30 09:25:45 lcl-usvr-01 sshd[5662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.161.112.2 user=root Jul 30 09:25:48 lcl-usvr-01 sshd[5662]: Failed password for root from 73.161.112.2 port 52328 ssh2 Jul 30 09:30:14 lcl-usvr-01 sshd[7244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.161.112.2 user=root Jul 30 09:30:17 lcl-usvr-01 sshd[7244]: Failed password for root from 73.161.112.2 port 48584 ssh2 |
2019-07-30 11:20:32 |
188.165.206.185 | attack | Jul 30 04:47:05 host sshd\[46916\]: Invalid user teamspeak from 188.165.206.185 port 42078 Jul 30 04:47:06 host sshd\[46916\]: Failed password for invalid user teamspeak from 188.165.206.185 port 42078 ssh2 ... |
2019-07-30 11:55:33 |
200.68.21.245 | attack | Unauthorised access (Jul 30) SRC=200.68.21.245 LEN=52 TTL=104 ID=28753 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-30 12:23:43 |