City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.117.66.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.117.66.142. IN A
;; AUTHORITY SECTION:
. 411 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 01:23:38 CST 2022
;; MSG SIZE rcvd: 106
Host 142.66.117.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.66.117.50.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
46.101.187.76 | attack | Jan 10 02:55:29 hanapaa sshd\[9513\]: Invalid user tester from 46.101.187.76 Jan 10 02:55:29 hanapaa sshd\[9513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ctrl.qa Jan 10 02:55:31 hanapaa sshd\[9513\]: Failed password for invalid user tester from 46.101.187.76 port 46211 ssh2 Jan 10 02:56:41 hanapaa sshd\[9635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ctrl.qa user=root Jan 10 02:56:43 hanapaa sshd\[9635\]: Failed password for root from 46.101.187.76 port 53028 ssh2 |
2020-01-11 01:35:08 |
192.241.249.226 | attackbots | frenzy |
2020-01-11 01:51:00 |
13.127.20.66 | attackbots | ICMP MH Probe, Scan /Distributed - |
2020-01-11 01:17:39 |
79.101.37.219 | attackbotsspam | Jan 10 13:56:18 grey postfix/smtpd\[30252\]: NOQUEUE: reject: RCPT from unknown\[79.101.37.219\]: 554 5.7.1 Service unavailable\; Client host \[79.101.37.219\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[79.101.37.219\]\; from=\ |
2020-01-11 01:49:49 |
222.85.176.9 | attack | [portscan] Port scan |
2020-01-11 01:45:08 |
218.92.0.184 | attackspam | Jan 10 18:15:00 MK-Soft-Root1 sshd[25252]: Failed password for root from 218.92.0.184 port 35757 ssh2 Jan 10 18:15:05 MK-Soft-Root1 sshd[25252]: Failed password for root from 218.92.0.184 port 35757 ssh2 ... |
2020-01-11 01:15:54 |
185.232.67.5 | attackspambots | Jan 10 17:57:53 dedicated sshd[22686]: Invalid user admin from 185.232.67.5 port 40416 |
2020-01-11 01:38:40 |
114.67.74.151 | attack | Jan 10 13:33:29 ws19vmsma01 sshd[195120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.151 Jan 10 13:33:30 ws19vmsma01 sshd[195120]: Failed password for invalid user darkman from 114.67.74.151 port 14287 ssh2 ... |
2020-01-11 01:37:01 |
104.236.38.105 | attackspambots | 2020-01-10T10:21:08.2737751495-001 sshd[39729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105 2020-01-10T10:21:08.2641151495-001 sshd[39729]: Invalid user isy from 104.236.38.105 port 52136 2020-01-10T10:21:10.5213161495-001 sshd[39729]: Failed password for invalid user isy from 104.236.38.105 port 52136 ssh2 2020-01-10T11:23:29.3574851495-001 sshd[42189]: Invalid user kzj from 104.236.38.105 port 50260 2020-01-10T11:23:29.3620081495-001 sshd[42189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105 2020-01-10T11:23:29.3574851495-001 sshd[42189]: Invalid user kzj from 104.236.38.105 port 50260 2020-01-10T11:23:31.1826661495-001 sshd[42189]: Failed password for invalid user kzj from 104.236.38.105 port 50260 ssh2 2020-01-10T11:26:12.4131041495-001 sshd[42329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105 user=root 2020-0 ... |
2020-01-11 01:37:58 |
13.59.114.33 | attackbotsspam | unauthorized connection attempt |
2020-01-11 01:26:17 |
49.88.112.67 | attack | Jan 10 18:27:18 v22018053744266470 sshd[9201]: Failed password for root from 49.88.112.67 port 63806 ssh2 Jan 10 18:28:24 v22018053744266470 sshd[9269]: Failed password for root from 49.88.112.67 port 36131 ssh2 ... |
2020-01-11 01:46:29 |
51.255.35.172 | attack | fail2ban honeypot |
2020-01-11 01:52:58 |
27.78.14.83 | attack | Jan 10 17:43:26 icinga sshd[55990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.14.83 Jan 10 17:43:28 icinga sshd[55990]: Failed password for invalid user user from 27.78.14.83 port 43900 ssh2 Jan 10 17:43:45 icinga sshd[56352]: Failed password for root from 27.78.14.83 port 40628 ssh2 ... |
2020-01-11 01:13:20 |
188.17.149.158 | attackspam | " " |
2020-01-11 01:30:42 |
106.13.239.120 | attackbots | Jan 10 14:28:14 meumeu sshd[11113]: Failed password for root from 106.13.239.120 port 53930 ssh2 Jan 10 14:31:52 meumeu sshd[11606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.239.120 Jan 10 14:31:54 meumeu sshd[11606]: Failed password for invalid user alien from 106.13.239.120 port 47416 ssh2 ... |
2020-01-11 01:44:46 |