City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.204.242.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.204.242.46. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:19:18 CST 2025
;; MSG SIZE rcvd: 106
46.242.204.64.in-addr.arpa domain name pointer 64-204-242-46.client.dsl.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
46.242.204.64.in-addr.arpa name = 64-204-242-46.client.dsl.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.192.201 | attackspam | 2020-03-27T14:03:52.344020xentho-1 sshd[116401]: Invalid user cdvonline from 106.12.192.201 port 56674 2020-03-27T14:03:54.599093xentho-1 sshd[116401]: Failed password for invalid user cdvonline from 106.12.192.201 port 56674 ssh2 2020-03-27T14:06:06.888976xentho-1 sshd[116432]: Invalid user nec from 106.12.192.201 port 60850 2020-03-27T14:06:06.897395xentho-1 sshd[116432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.192.201 2020-03-27T14:06:06.888976xentho-1 sshd[116432]: Invalid user nec from 106.12.192.201 port 60850 2020-03-27T14:06:09.539361xentho-1 sshd[116432]: Failed password for invalid user nec from 106.12.192.201 port 60850 ssh2 2020-03-27T14:08:16.422425xentho-1 sshd[116462]: Invalid user vmo from 106.12.192.201 port 36794 2020-03-27T14:08:16.429916xentho-1 sshd[116462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.192.201 2020-03-27T14:08:16.422425xentho-1 sshd[116462]: Inv ... |
2020-03-28 03:16:50 |
| 123.126.97.5 | attack | SSH login attempts. |
2020-03-28 02:54:50 |
| 216.200.145.235 | attack | SSH login attempts. |
2020-03-28 03:02:58 |
| 106.12.210.113 | attackbots | 2020-03-27T16:18:37.713613abusebot-2.cloudsearch.cf sshd[5006]: Invalid user wex from 106.12.210.113 port 56628 2020-03-27T16:18:37.718535abusebot-2.cloudsearch.cf sshd[5006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.113 2020-03-27T16:18:37.713613abusebot-2.cloudsearch.cf sshd[5006]: Invalid user wex from 106.12.210.113 port 56628 2020-03-27T16:18:40.023252abusebot-2.cloudsearch.cf sshd[5006]: Failed password for invalid user wex from 106.12.210.113 port 56628 ssh2 2020-03-27T16:24:53.191606abusebot-2.cloudsearch.cf sshd[5410]: Invalid user yfv from 106.12.210.113 port 34072 2020-03-27T16:24:53.198387abusebot-2.cloudsearch.cf sshd[5410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.113 2020-03-27T16:24:53.191606abusebot-2.cloudsearch.cf sshd[5410]: Invalid user yfv from 106.12.210.113 port 34072 2020-03-27T16:24:55.121611abusebot-2.cloudsearch.cf sshd[5410]: Failed password f ... |
2020-03-28 03:02:03 |
| 119.199.29.166 | attackspambots | 23/tcp 23/tcp 23/tcp... [2020-02-07/03-27]5pkt,1pt.(tcp) |
2020-03-28 02:45:45 |
| 93.63.153.172 | attackbotsspam | 20/3/27@08:29:44: FAIL: Alarm-Network address from=93.63.153.172 20/3/27@08:29:44: FAIL: Alarm-Network address from=93.63.153.172 ... |
2020-03-28 03:08:41 |
| 106.12.180.215 | attack | Invalid user teri from 106.12.180.215 port 58774 |
2020-03-28 03:21:39 |
| 106.12.24.170 | attackspam | Mar 25 17:55:41 itv-usvr-01 sshd[12892]: Invalid user ileana from 106.12.24.170 Mar 25 17:55:41 itv-usvr-01 sshd[12892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.170 Mar 25 17:55:41 itv-usvr-01 sshd[12892]: Invalid user ileana from 106.12.24.170 Mar 25 17:55:43 itv-usvr-01 sshd[12892]: Failed password for invalid user ileana from 106.12.24.170 port 42560 ssh2 Mar 25 17:59:47 itv-usvr-01 sshd[13043]: Invalid user carmelie from 106.12.24.170 |
2020-03-28 02:52:58 |
| 106.13.45.212 | attackspam | Mar 27 17:18:45 v22018086721571380 sshd[3933]: Failed password for invalid user stu from 106.13.45.212 port 41172 ssh2 Mar 27 18:19:14 v22018086721571380 sshd[15622]: Failed password for invalid user tnx from 106.13.45.212 port 58788 ssh2 |
2020-03-28 03:24:56 |
| 142.93.63.82 | attackspambots | 2020-03-27T18:12:15.918542abusebot-5.cloudsearch.cf sshd[7486]: Invalid user dnq from 142.93.63.82 port 39990 2020-03-27T18:12:15.925985abusebot-5.cloudsearch.cf sshd[7486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.63.82 2020-03-27T18:12:15.918542abusebot-5.cloudsearch.cf sshd[7486]: Invalid user dnq from 142.93.63.82 port 39990 2020-03-27T18:12:17.221498abusebot-5.cloudsearch.cf sshd[7486]: Failed password for invalid user dnq from 142.93.63.82 port 39990 ssh2 2020-03-27T18:16:11.104871abusebot-5.cloudsearch.cf sshd[7498]: Invalid user lgq from 142.93.63.82 port 33908 2020-03-27T18:16:11.113928abusebot-5.cloudsearch.cf sshd[7498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.63.82 2020-03-27T18:16:11.104871abusebot-5.cloudsearch.cf sshd[7498]: Invalid user lgq from 142.93.63.82 port 33908 2020-03-27T18:16:13.142005abusebot-5.cloudsearch.cf sshd[7498]: Failed password for invalid use ... |
2020-03-28 03:19:22 |
| 31.207.47.48 | attackbotsspam | Mar 27 13:51:06 debian-2gb-nbg1-2 kernel: \[7572537.209785\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=31.207.47.48 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=60999 PROTO=TCP SPT=44539 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-28 02:48:34 |
| 1.201.140.126 | attack | 2020-03-27T18:37:40.406068dmca.cloudsearch.cf sshd[530]: Invalid user mhp from 1.201.140.126 port 42151 2020-03-27T18:37:40.413484dmca.cloudsearch.cf sshd[530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126 2020-03-27T18:37:40.406068dmca.cloudsearch.cf sshd[530]: Invalid user mhp from 1.201.140.126 port 42151 2020-03-27T18:37:43.068547dmca.cloudsearch.cf sshd[530]: Failed password for invalid user mhp from 1.201.140.126 port 42151 ssh2 2020-03-27T18:44:43.528468dmca.cloudsearch.cf sshd[1223]: Invalid user eyr from 1.201.140.126 port 47954 2020-03-27T18:44:43.534203dmca.cloudsearch.cf sshd[1223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.201.140.126 2020-03-27T18:44:43.528468dmca.cloudsearch.cf sshd[1223]: Invalid user eyr from 1.201.140.126 port 47954 2020-03-27T18:44:44.924559dmca.cloudsearch.cf sshd[1223]: Failed password for invalid user eyr from 1.201.140.126 port 47954 ssh2 ... |
2020-03-28 03:04:36 |
| 64.233.165.26 | attackbots | SSH login attempts. |
2020-03-28 02:58:04 |
| 220.134.218.112 | attackspambots | $f2bV_matches |
2020-03-28 03:12:02 |
| 188.125.72.73 | attack | SSH login attempts. |
2020-03-28 03:14:03 |