City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.242.189.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.242.189.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:45:43 CST 2025
;; MSG SIZE rcvd: 106
Host 92.189.242.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 92.189.242.50.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.248.211.74 | attack | Sep 20 20:02:55 root sshd[7125]: Invalid user netman from 201.248.211.74 ... |
2020-09-21 13:13:02 |
| 91.134.231.81 | attack | 2020-09-20 14:29:47.280093-0500 localhost smtpd[65370]: NOQUEUE: reject: RCPT from unknown[91.134.231.81]: 450 4.7.25 Client host rejected: cannot find your hostname, [91.134.231.81]; from= |
2020-09-21 13:01:08 |
| 81.25.72.56 | attackbotsspam | 2020-09-20T17:03:05Z - RDP login failed multiple times. (81.25.72.56) |
2020-09-21 13:06:34 |
| 58.152.206.121 | attackspam | Sep 21 02:09:03 vps639187 sshd\[5992\]: Invalid user admin from 58.152.206.121 port 41315 Sep 21 02:09:04 vps639187 sshd\[5992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.206.121 Sep 21 02:09:06 vps639187 sshd\[5992\]: Failed password for invalid user admin from 58.152.206.121 port 41315 ssh2 ... |
2020-09-21 13:03:30 |
| 219.129.60.112 | attackspambots | Listed on zen-spamhaus also abuseat.org and dnsbl-sorbs / proto=6 . srcport=28986 . dstport=23 . (2342) |
2020-09-21 12:43:07 |
| 122.156.96.208 | attackspam | Listed on zen-spamhaus also barracudaCentral and abuseat.org / proto=6 . srcport=27997 . dstport=23 . (2340) |
2020-09-21 13:00:17 |
| 148.70.149.39 | attack | fail2ban detected brute force on sshd |
2020-09-21 12:55:48 |
| 222.186.169.192 | attackspambots | Sep 21 06:54:08 santamaria sshd\[11478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Sep 21 06:54:10 santamaria sshd\[11478\]: Failed password for root from 222.186.169.192 port 20076 ssh2 Sep 21 06:54:15 santamaria sshd\[11478\]: Failed password for root from 222.186.169.192 port 20076 ssh2 ... |
2020-09-21 12:56:37 |
| 103.45.150.159 | attackbots | Sep 21 02:41:29 marvibiene sshd[21152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.150.159 Sep 21 02:41:31 marvibiene sshd[21152]: Failed password for invalid user ftpuser from 103.45.150.159 port 56710 ssh2 |
2020-09-21 12:36:35 |
| 213.226.141.252 | attackbots | 2020-09-20 12:01:29.441601-0500 localhost smtpd[52512]: NOQUEUE: reject: RCPT from unknown[213.226.141.252]: 554 5.7.1 Service unavailable; Client host [213.226.141.252] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/213.226.141.252 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-09-21 12:57:56 |
| 62.234.115.152 | attack | Sep 21 05:55:32 itv-usvr-01 sshd[18584]: Invalid user nagios from 62.234.115.152 Sep 21 05:55:32 itv-usvr-01 sshd[18584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.115.152 Sep 21 05:55:32 itv-usvr-01 sshd[18584]: Invalid user nagios from 62.234.115.152 Sep 21 05:55:34 itv-usvr-01 sshd[18584]: Failed password for invalid user nagios from 62.234.115.152 port 49990 ssh2 Sep 21 06:00:31 itv-usvr-01 sshd[18809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.115.152 user=root Sep 21 06:00:32 itv-usvr-01 sshd[18809]: Failed password for root from 62.234.115.152 port 47138 ssh2 |
2020-09-21 12:45:13 |
| 181.49.118.185 | attack | Sep 21 02:08:35 ns382633 sshd\[14111\]: Invalid user user from 181.49.118.185 port 41142 Sep 21 02:08:35 ns382633 sshd\[14111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.118.185 Sep 21 02:08:36 ns382633 sshd\[14111\]: Failed password for invalid user user from 181.49.118.185 port 41142 ssh2 Sep 21 02:16:59 ns382633 sshd\[15810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.118.185 user=root Sep 21 02:17:00 ns382633 sshd\[15810\]: Failed password for root from 181.49.118.185 port 56040 ssh2 |
2020-09-21 13:13:24 |
| 177.23.184.99 | attackbots | Failed password for invalid user brenda from 177.23.184.99 port 36354 ssh2 |
2020-09-21 12:54:45 |
| 162.243.128.94 | attackbots |
|
2020-09-21 12:55:16 |
| 79.124.62.74 | attack | Port scan on 32 port(s): 50 228 415 701 1593 2988 3326 3360 4485 7003 7010 7017 7099 7117 7655 7791 7987 8800 9700 9981 10051 12530 15333 20025 20111 21888 30000 33880 33922 37777 39011 60000 |
2020-09-21 13:09:14 |