City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.42.153.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.42.153.201. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 13:06:25 CST 2025
;; MSG SIZE rcvd: 106
Host 201.153.42.64.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 201.153.42.64.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.175.51.107 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 16-03-2020 14:40:10. |
2020-03-17 03:31:25 |
| 52.172.32.208 | attack | IP blocked |
2020-03-17 03:29:49 |
| 201.49.127.212 | attackspambots | SSH bruteforce |
2020-03-17 03:07:23 |
| 178.171.67.92 | attackbotsspam | Chat Spam |
2020-03-17 03:35:03 |
| 89.248.168.202 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 82 - port: 1980 proto: TCP cat: Misc Attack |
2020-03-17 03:16:10 |
| 185.198.1.112 | attack | firewall-block, port(s): 80/tcp |
2020-03-17 03:15:16 |
| 211.167.75.228 | attackspambots | firewall-block, port(s): 1433/tcp |
2020-03-17 03:13:28 |
| 104.210.5.225 | attack | Mar 16 14:32:38 mail sshd\[34083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.210.5.225 user=root ... |
2020-03-17 03:44:42 |
| 218.92.0.145 | attackbotsspam | Mar 16 20:02:45 nextcloud sshd\[16376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145 user=root Mar 16 20:02:47 nextcloud sshd\[16376\]: Failed password for root from 218.92.0.145 port 27482 ssh2 Mar 16 20:02:51 nextcloud sshd\[16376\]: Failed password for root from 218.92.0.145 port 27482 ssh2 |
2020-03-17 03:21:12 |
| 203.95.212.41 | attackspambots | Mar 16 19:01:25 ks10 sshd[2567468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41 Mar 16 19:01:27 ks10 sshd[2567468]: Failed password for invalid user 10022\r from 203.95.212.41 port 21558 ssh2 ... |
2020-03-17 03:36:46 |
| 122.228.19.80 | attackspam | 122.228.19.80 was recorded 19 times by 6 hosts attempting to connect to the following ports: 10038,5351,9300,8126,1022,5353,5800,5683,4840,34568,18081,41794,5038,3388,4567,9500,880,11310,10333. Incident counter (4h, 24h, all-time): 19, 81, 28032 |
2020-03-17 03:26:32 |
| 153.128.37.50 | attackspambots | firewall-block, port(s): 445/tcp |
2020-03-17 03:23:53 |
| 1.209.72.151 | attackspam | firewall-block, port(s): 4567/tcp |
2020-03-17 03:40:59 |
| 109.42.2.89 | attackspam | Mar 16 15:39:59 [host] kernel: [999272.679429] [UF Mar 16 15:39:59 [host] kernel: [999272.687385] [UF Mar 16 15:40:03 [host] kernel: [999276.246722] [UF Mar 16 15:40:03 [host] kernel: [999276.254836] [UF Mar 16 15:40:10 [host] kernel: [999283.365306] [UF Mar 16 15:40:10 [host] kernel: [999283.413355] [UF |
2020-03-17 03:28:50 |
| 140.143.164.33 | attackspam | Mar 16 15:15:43 localhost sshd[129006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.164.33 user=root Mar 16 15:15:45 localhost sshd[129006]: Failed password for root from 140.143.164.33 port 38040 ssh2 Mar 16 15:18:42 localhost sshd[129299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.164.33 user=root Mar 16 15:18:45 localhost sshd[129299]: Failed password for root from 140.143.164.33 port 42636 ssh2 Mar 16 15:23:26 localhost sshd[129704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.164.33 user=root Mar 16 15:23:28 localhost sshd[129704]: Failed password for root from 140.143.164.33 port 47232 ssh2 ... |
2020-03-17 03:02:01 |