City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.93.202.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.93.202.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 10:52:13 CST 2025
;; MSG SIZE rcvd: 106
Host 142.202.93.64.in-addr.arpa not found: 2(SERVFAIL)
server can't find 64.93.202.142.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 189.168.108.241 | attackspam | firewall-block, port(s): 445/tcp |
2020-05-08 04:28:29 |
| 79.157.219.48 | attackspambots | 2020-05-07T19:12:36.388532mail.broermann.family sshd[28911]: Invalid user ftpuser from 79.157.219.48 port 43740 2020-05-07T19:12:36.394803mail.broermann.family sshd[28911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=48.red-79-157-219.dynamicip.rima-tde.net 2020-05-07T19:12:36.388532mail.broermann.family sshd[28911]: Invalid user ftpuser from 79.157.219.48 port 43740 2020-05-07T19:12:38.181516mail.broermann.family sshd[28911]: Failed password for invalid user ftpuser from 79.157.219.48 port 43740 ssh2 2020-05-07T19:19:29.443808mail.broermann.family sshd[29111]: Invalid user emerson from 79.157.219.48 port 34840 ... |
2020-05-08 04:41:12 |
| 206.189.71.79 | attackspam | May 7 23:07:09 gw1 sshd[14015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.71.79 May 7 23:07:11 gw1 sshd[14015]: Failed password for invalid user r from 206.189.71.79 port 33132 ssh2 ... |
2020-05-08 04:30:17 |
| 92.222.75.80 | attack | May 7 22:30:14 lukav-desktop sshd\[14390\]: Invalid user ts from 92.222.75.80 May 7 22:30:14 lukav-desktop sshd\[14390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80 May 7 22:30:16 lukav-desktop sshd\[14390\]: Failed password for invalid user ts from 92.222.75.80 port 45876 ssh2 May 7 22:37:34 lukav-desktop sshd\[14582\]: Invalid user suraj from 92.222.75.80 May 7 22:37:34 lukav-desktop sshd\[14582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80 |
2020-05-08 04:20:32 |
| 122.225.230.10 | attack | May 7 23:22:37 pkdns2 sshd\[16770\]: Invalid user suman from 122.225.230.10May 7 23:22:39 pkdns2 sshd\[16770\]: Failed password for invalid user suman from 122.225.230.10 port 43856 ssh2May 7 23:25:47 pkdns2 sshd\[16941\]: Failed password for root from 122.225.230.10 port 35112 ssh2May 7 23:28:05 pkdns2 sshd\[17054\]: Invalid user dispecer from 122.225.230.10May 7 23:28:08 pkdns2 sshd\[17054\]: Failed password for invalid user dispecer from 122.225.230.10 port 46836 ssh2May 7 23:30:25 pkdns2 sshd\[17201\]: Invalid user tun from 122.225.230.10 ... |
2020-05-08 04:46:32 |
| 14.161.49.29 | attackspambots | Dovecot Invalid User Login Attempt. |
2020-05-08 04:21:01 |
| 189.202.204.230 | attack | (sshd) Failed SSH login from 189.202.204.230 (MX/Mexico/mail.ciatej.net.mx): 5 in the last 3600 secs |
2020-05-08 04:52:50 |
| 129.28.196.215 | attackbots | May 7 21:20:36 lukav-desktop sshd\[2911\]: Invalid user usk from 129.28.196.215 May 7 21:20:36 lukav-desktop sshd\[2911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.196.215 May 7 21:20:38 lukav-desktop sshd\[2911\]: Failed password for invalid user usk from 129.28.196.215 port 53916 ssh2 May 7 21:22:13 lukav-desktop sshd\[2958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.196.215 user=root May 7 21:22:14 lukav-desktop sshd\[2958\]: Failed password for root from 129.28.196.215 port 43686 ssh2 |
2020-05-08 04:44:32 |
| 103.79.90.72 | attackbots | May 7 19:20:51 scw-6657dc sshd[14194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.90.72 May 7 19:20:51 scw-6657dc sshd[14194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.79.90.72 May 7 19:20:53 scw-6657dc sshd[14194]: Failed password for invalid user zebra from 103.79.90.72 port 38768 ssh2 ... |
2020-05-08 04:40:27 |
| 123.120.156.219 | attack | May 8 00:54:17 webhost01 sshd[1772]: Failed password for root from 123.120.156.219 port 55973 ssh2 May 8 00:56:11 webhost01 sshd[1791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.120.156.219 ... |
2020-05-08 04:54:47 |
| 122.51.198.248 | attack | May 7 13:16:01 ny01 sshd[547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 May 7 13:16:03 ny01 sshd[547]: Failed password for invalid user pluto from 122.51.198.248 port 54004 ssh2 May 7 13:19:55 ny01 sshd[1120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.248 |
2020-05-08 04:21:49 |
| 203.92.113.188 | attackspambots | May 7 20:31:03 vps687878 sshd\[19545\]: Failed password for invalid user zsf from 203.92.113.188 port 58654 ssh2 May 7 20:35:08 vps687878 sshd\[19932\]: Invalid user tester1 from 203.92.113.188 port 39498 May 7 20:35:08 vps687878 sshd\[19932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.92.113.188 May 7 20:35:10 vps687878 sshd\[19932\]: Failed password for invalid user tester1 from 203.92.113.188 port 39498 ssh2 May 7 20:39:15 vps687878 sshd\[20182\]: Invalid user ahsan from 203.92.113.188 port 48574 May 7 20:39:15 vps687878 sshd\[20182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.92.113.188 ... |
2020-05-08 04:30:28 |
| 188.112.10.120 | attackspam | May 7 20:41:57 ip-172-31-61-156 sshd[20271]: Invalid user te from 188.112.10.120 May 7 20:41:59 ip-172-31-61-156 sshd[20271]: Failed password for invalid user te from 188.112.10.120 port 34054 ssh2 May 7 20:41:57 ip-172-31-61-156 sshd[20271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.112.10.120 May 7 20:41:57 ip-172-31-61-156 sshd[20271]: Invalid user te from 188.112.10.120 May 7 20:41:59 ip-172-31-61-156 sshd[20271]: Failed password for invalid user te from 188.112.10.120 port 34054 ssh2 ... |
2020-05-08 04:43:42 |
| 86.57.234.172 | attackbots | May 7 14:56:28 NPSTNNYC01T sshd[30644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.57.234.172 May 7 14:56:30 NPSTNNYC01T sshd[30644]: Failed password for invalid user pippin from 86.57.234.172 port 49092 ssh2 May 7 15:02:09 NPSTNNYC01T sshd[31413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.57.234.172 ... |
2020-05-08 04:22:20 |
| 183.87.192.235 | attack | May 7 14:38:04 ny01 sshd[13179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.192.235 May 7 14:38:06 ny01 sshd[13179]: Failed password for invalid user kbe from 183.87.192.235 port 35896 ssh2 May 7 14:42:00 ny01 sshd[13677]: Failed password for root from 183.87.192.235 port 44896 ssh2 |
2020-05-08 04:48:47 |