City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.42.112.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.42.112.180. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:53:19 CST 2025
;; MSG SIZE rcvd: 106
Host 180.112.42.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 180.112.42.54.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.252.62.162 | attack | Unauthorized connection attempt detected from IP address 180.252.62.162 to port 445 |
2019-12-27 18:16:09 |
| 103.14.33.229 | attack | Invalid user test from 103.14.33.229 port 54322 |
2019-12-27 18:05:20 |
| 106.12.31.99 | attackspam | /var/log/messages:Dec 26 18:51:40 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1577386300.533:83684): pid=5552 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=5553 suid=74 rport=42144 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=106.12.31.99 terminal=? res=success' /var/log/messages:Dec 26 18:51:40 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1577386300.537:83685): pid=5552 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=5553 suid=74 rport=42144 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=106.12.31.99 terminal=? res=success' /var/log/messages:Dec 26 18:51:42 sanyalnet-cloud-vps fail2ban.filter[1551]: INFO [sshd] Found 106.1........ ------------------------------- |
2019-12-27 17:59:41 |
| 92.119.160.143 | attack | Dec 27 09:07:10 h2177944 kernel: \[632745.066403\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=14331 PROTO=TCP SPT=48764 DPT=63616 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 27 09:07:10 h2177944 kernel: \[632745.066417\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=14331 PROTO=TCP SPT=48764 DPT=63616 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 27 09:11:43 h2177944 kernel: \[633018.494373\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39460 PROTO=TCP SPT=48764 DPT=34460 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 27 09:11:43 h2177944 kernel: \[633018.494391\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39460 PROTO=TCP SPT=48764 DPT=34460 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 27 09:23:04 h2177944 kernel: \[633699.458272\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.143 DST=85.214.1 |
2019-12-27 17:52:42 |
| 122.140.49.17 | attackbots | Fail2Ban Ban Triggered |
2019-12-27 18:21:59 |
| 119.42.175.200 | attackspam | Invalid user server from 119.42.175.200 port 40512 |
2019-12-27 18:30:51 |
| 76.10.14.76 | attack | Dec 27 16:34:51 webhost01 sshd[14399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.10.14.76 Dec 27 16:34:53 webhost01 sshd[14399]: Failed password for invalid user worf from 76.10.14.76 port 40030 ssh2 ... |
2019-12-27 18:15:13 |
| 218.144.166.212 | attack | Dec 27 10:22:35 vps647732 sshd[14582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.144.166.212 Dec 27 10:22:37 vps647732 sshd[14582]: Failed password for invalid user squid from 218.144.166.212 port 46244 ssh2 ... |
2019-12-27 17:55:06 |
| 191.125.40.183 | attack | Port 22 Scan, PTR: None |
2019-12-27 18:07:33 |
| 51.158.25.170 | attack | Fail2Ban Ban Triggered |
2019-12-27 18:13:53 |
| 94.53.53.47 | attackspam | Port 22 Scan, PTR: None |
2019-12-27 18:04:52 |
| 162.241.182.29 | attackbotsspam | Dec 27 08:28:08 minden010 sshd[1412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.182.29 Dec 27 08:28:10 minden010 sshd[1412]: Failed password for invalid user temp from 162.241.182.29 port 58414 ssh2 Dec 27 08:30:26 minden010 sshd[3333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.182.29 ... |
2019-12-27 18:20:03 |
| 113.160.223.20 | attack | Unauthorized connection attempt detected from IP address 113.160.223.20 to port 445 |
2019-12-27 18:06:14 |
| 91.121.16.153 | attack | Brute force SMTP login attempted. ... |
2019-12-27 18:08:52 |
| 188.240.208.237 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-27 18:31:59 |