City: Fort Wayne
Region: Indiana
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.121.19.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61055
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.121.19.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:06:19 CST 2025
;; MSG SIZE rcvd: 105
Host 42.19.121.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.19.121.50.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.29.114.235 | attackspam | Oct 15 03:54:19 *** sshd[5593]: Invalid user silverline from 119.29.114.235 |
2019-10-15 12:24:32 |
| 188.226.250.69 | attackspambots | Oct 15 03:54:51 www_kotimaassa_fi sshd[23878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.250.69 Oct 15 03:54:53 www_kotimaassa_fi sshd[23878]: Failed password for invalid user maw from 188.226.250.69 port 50258 ssh2 ... |
2019-10-15 12:07:19 |
| 31.13.227.4 | attackspambots | [munged]::443 31.13.227.4 - - [15/Oct/2019:01:45:03 +0200] "POST /[munged]: HTTP/1.1" 200 9278 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 31.13.227.4 - - [15/Oct/2019:01:45:07 +0200] "POST /[munged]: HTTP/1.1" 200 4586 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 31.13.227.4 - - [15/Oct/2019:01:45:09 +0200] "POST /[munged]: HTTP/1.1" 200 4586 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 31.13.227.4 - - [15/Oct/2019:01:45:11 +0200] "POST /[munged]: HTTP/1.1" 200 4586 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 31.13.227.4 - - [15/Oct/2019:01:45:13 +0200] "POST /[munged]: HTTP/1.1" 200 4586 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 31.13.227.4 - - [15/Oct/2019:01:45:15 +0200] "POST |
2019-10-15 07:54:28 |
| 91.90.114.186 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/91.90.114.186/ PL - 1H : (209) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PL NAME ASN : ASN49787 IP : 91.90.114.186 CIDR : 91.90.112.0/21 PREFIX COUNT : 4 UNIQUE IP COUNT : 3712 WYKRYTE ATAKI Z ASN49787 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-15 05:54:15 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-15 12:30:19 |
| 69.12.84.54 | attackbotsspam | WordPress login Brute force / Web App Attack on client site. |
2019-10-15 07:54:14 |
| 125.162.227.100 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/125.162.227.100/ ID - 1H : (38) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ID NAME ASN : ASN7713 IP : 125.162.227.100 CIDR : 125.162.224.0/22 PREFIX COUNT : 2255 UNIQUE IP COUNT : 2765312 WYKRYTE ATAKI Z ASN7713 : 1H - 1 3H - 1 6H - 4 12H - 8 24H - 9 DateTime : 2019-10-15 05:54:37 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-15 12:14:42 |
| 23.94.133.72 | attack | Oct 15 05:54:52 srv206 sshd[31044]: Invalid user ij from 23.94.133.72 Oct 15 05:54:52 srv206 sshd[31044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.133.72 Oct 15 05:54:52 srv206 sshd[31044]: Invalid user ij from 23.94.133.72 Oct 15 05:54:54 srv206 sshd[31044]: Failed password for invalid user ij from 23.94.133.72 port 47746 ssh2 ... |
2019-10-15 12:06:56 |
| 102.68.17.48 | attack | Automatic report - SSH Brute-Force Attack |
2019-10-15 12:17:48 |
| 23.94.87.249 | attackbotsspam | (From shortraquel040@gmail.com) Hi! Have you considered fine-tuning your site to produce and share high-quality, optimized content than can be easily found by search engines and be easily found by potential clients? I sent you this email because I'm a freelancer who does SEO (search engine optimization) for websites run by small businesses. This is the secret of many successful startup companies. My services deliver excellent results at a cheap price, so you don't have to worry. I'm offering you a free consultation, so I can provide you some expert advice and present you data about your website's potential. The information I'll send can benefit your business whether or not you choose to avail of my services. I'm hoping we can talk soon. Please write back to inform me about the best time to give you a call. Talk to you soon! Thanks! Raquel Short |
2019-10-15 12:29:16 |
| 186.226.172.1 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/186.226.172.1/ BR - 1H : (182) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN53180 IP : 186.226.172.1 CIDR : 186.226.172.0/24 PREFIX COUNT : 16 UNIQUE IP COUNT : 4096 WYKRYTE ATAKI Z ASN53180 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-15 05:55:01 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-10-15 12:01:24 |
| 51.75.195.39 | attack | Oct 15 06:55:15 tuotantolaitos sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.39 Oct 15 06:55:17 tuotantolaitos sshd[31416]: Failed password for invalid user admin1 from 51.75.195.39 port 37072 ssh2 ... |
2019-10-15 12:07:34 |
| 128.199.240.173 | attack | *Port Scan* detected from 128.199.240.173 (SG/Singapore/-). 4 hits in the last 186 seconds |
2019-10-15 12:01:03 |
| 128.199.243.138 | attackbotsspam | Oct 14 21:44:21 rotator sshd\[18809\]: Invalid user toor from 128.199.243.138Oct 14 21:44:23 rotator sshd\[18809\]: Failed password for invalid user toor from 128.199.243.138 port 56910 ssh2Oct 14 21:48:47 rotator sshd\[19609\]: Invalid user 2wsx\#EDC from 128.199.243.138Oct 14 21:48:49 rotator sshd\[19609\]: Failed password for invalid user 2wsx\#EDC from 128.199.243.138 port 40598 ssh2Oct 14 21:53:18 rotator sshd\[20399\]: Invalid user 123ASDasd$%\^ from 128.199.243.138Oct 14 21:53:19 rotator sshd\[20399\]: Failed password for invalid user 123ASDasd$%\^ from 128.199.243.138 port 52520 ssh2 ... |
2019-10-15 07:52:43 |
| 223.111.139.221 | attack | Scanning and Vuln Attempts |
2019-10-15 12:30:39 |
| 27.116.60.106 | attackbotsspam | Scanning and Vuln Attempts |
2019-10-15 12:11:11 |