City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.93.42.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.93.42.7. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 16:03:29 CST 2025
;; MSG SIZE rcvd: 102
b'Host 7.42.93.6.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 6.93.42.7.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
45.3.187.214 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-09-01 16:18:18 |
218.92.0.133 | attackbotsspam | (sshd) Failed SSH login from 218.92.0.133 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 1 03:56:26 server sshd[13263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Sep 1 03:56:26 server sshd[13261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Sep 1 03:56:26 server sshd[13265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Sep 1 03:56:27 server sshd[13269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Sep 1 03:56:27 server sshd[13263]: Failed password for root from 218.92.0.133 port 52061 ssh2 |
2020-09-01 16:05:42 |
222.186.31.166 | attackspam | 2020-09-01T10:28:26.718041vps773228.ovh.net sshd[5703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root 2020-09-01T10:28:28.477640vps773228.ovh.net sshd[5703]: Failed password for root from 222.186.31.166 port 27996 ssh2 2020-09-01T10:28:26.718041vps773228.ovh.net sshd[5703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root 2020-09-01T10:28:28.477640vps773228.ovh.net sshd[5703]: Failed password for root from 222.186.31.166 port 27996 ssh2 2020-09-01T10:28:31.529934vps773228.ovh.net sshd[5703]: Failed password for root from 222.186.31.166 port 27996 ssh2 ... |
2020-09-01 16:38:39 |
222.186.175.167 | attackspam | Sep 1 08:30:09 localhost sshd[123689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Sep 1 08:30:11 localhost sshd[123689]: Failed password for root from 222.186.175.167 port 9078 ssh2 Sep 1 08:30:14 localhost sshd[123689]: Failed password for root from 222.186.175.167 port 9078 ssh2 Sep 1 08:30:09 localhost sshd[123689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Sep 1 08:30:11 localhost sshd[123689]: Failed password for root from 222.186.175.167 port 9078 ssh2 Sep 1 08:30:14 localhost sshd[123689]: Failed password for root from 222.186.175.167 port 9078 ssh2 Sep 1 08:30:09 localhost sshd[123689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Sep 1 08:30:11 localhost sshd[123689]: Failed password for root from 222.186.175.167 port 9078 ssh2 Sep 1 08:30:14 localhost sshd ... |
2020-09-01 16:38:01 |
184.105.247.239 | attackspam | srv02 Mass scanning activity detected Target: 5351 .. |
2020-09-01 16:09:58 |
192.35.168.120 | attackbotsspam | Port Scan ... |
2020-09-01 16:34:06 |
118.89.229.84 | attackbotsspam | 2020-09-01T11:35:36.017361lavrinenko.info sshd[20382]: Invalid user wangqiang from 118.89.229.84 port 50346 2020-09-01T11:35:36.028254lavrinenko.info sshd[20382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84 2020-09-01T11:35:36.017361lavrinenko.info sshd[20382]: Invalid user wangqiang from 118.89.229.84 port 50346 2020-09-01T11:35:37.486463lavrinenko.info sshd[20382]: Failed password for invalid user wangqiang from 118.89.229.84 port 50346 ssh2 2020-09-01T11:38:50.351054lavrinenko.info sshd[20570]: Invalid user ljq from 118.89.229.84 port 58560 ... |
2020-09-01 16:39:19 |
62.215.6.11 | attack | 2020-09-01T09:46:38.957338vps773228.ovh.net sshd[5378]: Invalid user ha from 62.215.6.11 port 41580 2020-09-01T09:46:38.971071vps773228.ovh.net sshd[5378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=out02-tec.fasttelco.net 2020-09-01T09:46:38.957338vps773228.ovh.net sshd[5378]: Invalid user ha from 62.215.6.11 port 41580 2020-09-01T09:46:41.101901vps773228.ovh.net sshd[5378]: Failed password for invalid user ha from 62.215.6.11 port 41580 ssh2 2020-09-01T09:50:53.915366vps773228.ovh.net sshd[5434]: Invalid user informix from 62.215.6.11 port 43551 ... |
2020-09-01 16:14:41 |
5.255.253.9 | attack | (mod_security) mod_security (id:210740) triggered by 5.255.253.9 (RU/Russia/5-255-253-9.spider.yandex.com): 5 in the last 3600 secs |
2020-09-01 16:27:50 |
128.199.88.188 | attackbotsspam | Sep 1 10:18:38 electroncash sshd[11305]: Invalid user 123456 from 128.199.88.188 port 52800 Sep 1 10:18:38 electroncash sshd[11305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.188 Sep 1 10:18:38 electroncash sshd[11305]: Invalid user 123456 from 128.199.88.188 port 52800 Sep 1 10:18:41 electroncash sshd[11305]: Failed password for invalid user 123456 from 128.199.88.188 port 52800 ssh2 Sep 1 10:22:45 electroncash sshd[12438]: Invalid user united11 from 128.199.88.188 port 43213 ... |
2020-09-01 16:28:23 |
122.162.196.148 | attack | 122.162.196.148 - - [01/Sep/2020:07:55:23 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18277 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 122.162.196.148 - - [01/Sep/2020:07:55:24 +0100] "POST /wp-login.php HTTP/1.1" 503 18277 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 122.162.196.148 - - [01/Sep/2020:07:58:27 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18277 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" ... |
2020-09-01 16:26:16 |
185.175.93.24 | attackspambots |
|
2020-09-01 16:39:06 |
222.186.180.130 | attackspam | Sep 1 04:12:40 NPSTNNYC01T sshd[19430]: Failed password for root from 222.186.180.130 port 46438 ssh2 Sep 1 04:12:42 NPSTNNYC01T sshd[19430]: Failed password for root from 222.186.180.130 port 46438 ssh2 Sep 1 04:12:45 NPSTNNYC01T sshd[19430]: Failed password for root from 222.186.180.130 port 46438 ssh2 ... |
2020-09-01 16:14:13 |
191.235.99.74 | attackbotsspam | 2020-09-01 08:47:53 dovecot_login authenticator failed for (ADMIN) [191.235.99.74]: 535 Incorrect authentication data (set_id=admin@l-anod.ru) ... |
2020-09-01 16:22:24 |
45.142.120.36 | attackbotsspam | 2020-09-01 11:40:18 auth_plain authenticator failed for (User) [45.142.120.36]: 535 Incorrect authentication data (set_id=psa@lavrinenko.info) 2020-09-01 11:40:56 auth_plain authenticator failed for (User) [45.142.120.36]: 535 Incorrect authentication data (set_id=socio@lavrinenko.info) ... |
2020-09-01 16:41:42 |