City: unknown
Region: unknown
Country: United States of America
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-06 03:43:18 |
attackbots | 2020-10-05T01:09:12.969208abusebot-8.cloudsearch.cf sshd[26064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root 2020-10-05T01:09:15.103934abusebot-8.cloudsearch.cf sshd[26064]: Failed password for root from 68.183.19.26 port 51566 ssh2 2020-10-05T01:14:27.437899abusebot-8.cloudsearch.cf sshd[26107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root 2020-10-05T01:14:29.146643abusebot-8.cloudsearch.cf sshd[26107]: Failed password for root from 68.183.19.26 port 38596 ssh2 2020-10-05T01:16:39.262846abusebot-8.cloudsearch.cf sshd[26135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root 2020-10-05T01:16:41.428142abusebot-8.cloudsearch.cf sshd[26135]: Failed password for root from 68.183.19.26 port 50382 ssh2 2020-10-05T01:18:50.444689abusebot-8.cloudsearch.cf sshd[26190]: pam_unix(sshd:auth): authenticat ... |
2020-10-05 19:38:06 |
attackspambots | SSH Invalid Login |
2020-10-01 07:47:32 |
attackbots | Invalid user nagios from 68.183.19.26 port 34506 |
2020-10-01 00:16:58 |
attackbots | Time: Wed Sep 30 06:01:02 2020 +0000 IP: 68.183.19.26 (US/United States/kaltim.bawaslu.go.id) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 30 05:51:47 1-1 sshd[57916]: Invalid user design from 68.183.19.26 port 56818 Sep 30 05:51:49 1-1 sshd[57916]: Failed password for invalid user design from 68.183.19.26 port 56818 ssh2 Sep 30 05:57:25 1-1 sshd[58099]: Invalid user job from 68.183.19.26 port 60360 Sep 30 05:57:27 1-1 sshd[58099]: Failed password for invalid user job from 68.183.19.26 port 60360 ssh2 Sep 30 06:01:01 1-1 sshd[58229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root |
2020-09-30 16:38:04 |
attackbotsspam | Sep 8 17:59:29 Ubuntu-1404-trusty-64-minimal sshd\[3869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root Sep 8 17:59:31 Ubuntu-1404-trusty-64-minimal sshd\[3869\]: Failed password for root from 68.183.19.26 port 53312 ssh2 Sep 8 18:23:27 Ubuntu-1404-trusty-64-minimal sshd\[24447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root Sep 8 18:23:29 Ubuntu-1404-trusty-64-minimal sshd\[24447\]: Failed password for root from 68.183.19.26 port 38650 ssh2 Sep 8 18:28:57 Ubuntu-1404-trusty-64-minimal sshd\[26118\]: Invalid user minecraft from 68.183.19.26 |
2020-09-09 02:07:23 |
attackspambots | Sep 7 20:23:15 vps647732 sshd[19586]: Failed password for root from 68.183.19.26 port 34266 ssh2 ... |
2020-09-08 17:37:09 |
attack | Aug 21 22:20:49 plex-server sshd[1148431]: Invalid user git from 68.183.19.26 port 56984 Aug 21 22:20:49 plex-server sshd[1148431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 Aug 21 22:20:49 plex-server sshd[1148431]: Invalid user git from 68.183.19.26 port 56984 Aug 21 22:20:51 plex-server sshd[1148431]: Failed password for invalid user git from 68.183.19.26 port 56984 ssh2 Aug 21 22:22:50 plex-server sshd[1149201]: Invalid user moon from 68.183.19.26 port 53772 ... |
2020-08-22 06:38:28 |
attackspambots | Invalid user john from 68.183.19.26 port 39464 |
2020-08-21 07:58:52 |
attackspambots | Aug 15 07:08:35 Host-KLAX-C sshd[15685]: Disconnected from invalid user root 68.183.19.26 port 58750 [preauth] ... |
2020-08-16 00:11:33 |
attackbots | Aug 14 09:46:30 ws24vmsma01 sshd[76867]: Failed password for root from 68.183.19.26 port 47704 ssh2 Aug 14 09:52:49 ws24vmsma01 sshd[228493]: Failed password for root from 68.183.19.26 port 33404 ssh2 ... |
2020-08-15 01:18:25 |
attack | *Port Scan* detected from 68.183.19.26 (US/United States/New Jersey/North Bergen/kaltim.bawaslu.go.id). 4 hits in the last 75 seconds |
2020-08-08 07:55:30 |
attackspambots | Jul 27 14:06:47 *hidden* sshd[9657]: Failed password for invalid user csgoserver from 68.183.19.26 port 48202 ssh2 Jul 27 14:13:08 *hidden* sshd[25031]: Invalid user saram from 68.183.19.26 port 35244 Jul 27 14:13:08 *hidden* sshd[25031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 Jul 27 14:13:10 *hidden* sshd[25031]: Failed password for invalid user saram from 68.183.19.26 port 35244 ssh2 Jul 27 14:19:07 *hidden* sshd[39538]: Invalid user amar from 68.183.19.26 port 48092 |
2020-07-27 22:01:08 |
attackspambots | Invalid user miwa from 68.183.19.26 port 53762 |
2020-07-18 20:59:14 |
attackspam | Jul 16 17:04:17 home sshd[17339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 Jul 16 17:04:20 home sshd[17339]: Failed password for invalid user mirko from 68.183.19.26 port 59792 ssh2 Jul 16 17:09:41 home sshd[17973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 ... |
2020-07-17 01:21:40 |
attackbots | 2020-07-10T02:17:07.211822snf-827550 sshd[3089]: Invalid user sfc from 68.183.19.26 port 34454 2020-07-10T02:17:09.082335snf-827550 sshd[3089]: Failed password for invalid user sfc from 68.183.19.26 port 34454 ssh2 2020-07-10T02:21:37.566334snf-827550 sshd[3140]: Invalid user sharaine from 68.183.19.26 port 58422 ... |
2020-07-10 08:03:14 |
attackspambots | Jul 8 19:03:03 rotator sshd\[5137\]: Address 68.183.19.26 maps to kaltim.bawaslu.go.id, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jul 8 19:03:03 rotator sshd\[5137\]: Invalid user vyatta from 68.183.19.26Jul 8 19:03:04 rotator sshd\[5137\]: Failed password for invalid user vyatta from 68.183.19.26 port 46068 ssh2Jul 8 19:07:14 rotator sshd\[5931\]: Address 68.183.19.26 maps to kaltim.bawaslu.go.id, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jul 8 19:07:14 rotator sshd\[5931\]: Invalid user RCadmin from 68.183.19.26Jul 8 19:07:16 rotator sshd\[5931\]: Failed password for invalid user RCadmin from 68.183.19.26 port 42420 ssh2 ... |
2020-07-09 02:07:54 |
attackbots | Jul 4 11:01:42 abendstille sshd\[17661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root Jul 4 11:01:44 abendstille sshd\[17661\]: Failed password for root from 68.183.19.26 port 56246 ssh2 Jul 4 11:05:57 abendstille sshd\[22295\]: Invalid user lcd from 68.183.19.26 Jul 4 11:05:57 abendstille sshd\[22295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 Jul 4 11:05:58 abendstille sshd\[22295\]: Failed password for invalid user lcd from 68.183.19.26 port 53508 ssh2 ... |
2020-07-04 17:11:58 |
attackspam | Scanned 3 times in the last 24 hours on port 22 |
2020-07-04 08:42:09 |
attack | 2020-06-23T12:25:49.887855mail.csmailer.org sshd[28215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 2020-06-23T12:25:49.884932mail.csmailer.org sshd[28215]: Invalid user volker from 68.183.19.26 port 45416 2020-06-23T12:25:51.232448mail.csmailer.org sshd[28215]: Failed password for invalid user volker from 68.183.19.26 port 45416 ssh2 2020-06-23T12:28:14.335042mail.csmailer.org sshd[28575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root 2020-06-23T12:28:15.920477mail.csmailer.org sshd[28575]: Failed password for root from 68.183.19.26 port 47404 ssh2 ... |
2020-06-23 20:35:01 |
attackbotsspam | Invalid user student from 68.183.19.26 port 46244 |
2020-06-18 15:00:51 |
attackbotsspam | Jun 12 06:07:08 vps687878 sshd\[13379\]: Failed password for invalid user user from 68.183.19.26 port 54350 ssh2 Jun 12 06:11:49 vps687878 sshd\[14040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root Jun 12 06:11:52 vps687878 sshd\[14040\]: Failed password for root from 68.183.19.26 port 56444 ssh2 Jun 12 06:16:31 vps687878 sshd\[14623\]: Invalid user operations from 68.183.19.26 port 58536 Jun 12 06:16:31 vps687878 sshd\[14623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 ... |
2020-06-12 12:33:56 |
attackbots | *Port Scan* detected from 68.183.19.26 (US/United States/New Jersey/North Bergen/kaltim.bawaslu.go.id). 4 hits in the last 295 seconds |
2020-06-05 15:03:32 |
attackbots | May 20 02:23:59 piServer sshd[27079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 May 20 02:24:02 piServer sshd[27079]: Failed password for invalid user jkv from 68.183.19.26 port 57996 ssh2 May 20 02:29:09 piServer sshd[27620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 ... |
2020-05-20 08:32:13 |
attack | 2020-04-29T16:09:17.730671homeassistant sshd[7187]: Invalid user developer from 68.183.19.26 port 48552 2020-04-29T16:09:17.740223homeassistant sshd[7187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 ... |
2020-04-30 02:16:09 |
attack | SSH bruteforce |
2020-04-25 02:29:35 |
attackbotsspam | Apr 22 19:38:06 MainVPS sshd[14165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 user=root Apr 22 19:38:08 MainVPS sshd[14165]: Failed password for root from 68.183.19.26 port 36670 ssh2 Apr 22 19:45:43 MainVPS sshd[20687]: Invalid user git from 68.183.19.26 port 46140 Apr 22 19:45:43 MainVPS sshd[20687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.26 Apr 22 19:45:43 MainVPS sshd[20687]: Invalid user git from 68.183.19.26 port 46140 Apr 22 19:45:45 MainVPS sshd[20687]: Failed password for invalid user git from 68.183.19.26 port 46140 ssh2 ... |
2020-04-23 03:46:02 |
attackbotsspam | Invalid user st from 68.183.19.26 port 50512 |
2020-04-22 07:32:10 |
attackspambots | Invalid user roosevelt1 from 68.183.19.26 port 50360 |
2020-04-12 03:36:10 |
attackbotsspam | Apr 3 07:59:48 minden010 sshd[6237]: Failed password for root from 68.183.19.26 port 37174 ssh2 Apr 3 08:04:35 minden010 sshd[8464]: Failed password for root from 68.183.19.26 port 50116 ssh2 ... |
2020-04-03 14:49:06 |
IP | Type | Details | Datetime |
---|---|---|---|
68.183.199.238 | attackspambots | Sep 23 13:01:26 *hidden* postfix/postscreen[304]: DNSBL rank 3 for [68.183.199.238]:46920 |
2020-10-10 23:10:14 |
68.183.199.238 | attackspam | Sep 23 13:01:26 *hidden* postfix/postscreen[304]: DNSBL rank 3 for [68.183.199.238]:46920 |
2020-10-10 15:00:39 |
68.183.193.148 | attackspambots | Sep 26 14:53:36 markkoudstaal sshd[12506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148 Sep 26 14:53:38 markkoudstaal sshd[12506]: Failed password for invalid user mc2 from 68.183.193.148 port 44312 ssh2 Sep 26 14:57:25 markkoudstaal sshd[13543]: Failed password for root from 68.183.193.148 port 52758 ssh2 ... |
2020-09-27 07:15:13 |
68.183.193.148 | attack | Sep 26 14:53:36 markkoudstaal sshd[12506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148 Sep 26 14:53:38 markkoudstaal sshd[12506]: Failed password for invalid user mc2 from 68.183.193.148 port 44312 ssh2 Sep 26 14:57:25 markkoudstaal sshd[13543]: Failed password for root from 68.183.193.148 port 52758 ssh2 ... |
2020-09-26 23:43:36 |
68.183.193.148 | attackspambots | Brute force attempt |
2020-09-26 15:34:44 |
68.183.191.39 | attackspam | Sep 25 11:14:35 web1 sshd[8443]: Invalid user sonar from 68.183.191.39 port 38970 Sep 25 11:14:35 web1 sshd[8443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.191.39 Sep 25 11:14:35 web1 sshd[8443]: Invalid user sonar from 68.183.191.39 port 38970 Sep 25 11:14:37 web1 sshd[8443]: Failed password for invalid user sonar from 68.183.191.39 port 38970 ssh2 Sep 25 11:21:21 web1 sshd[10956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.191.39 user=root Sep 25 11:21:24 web1 sshd[10956]: Failed password for root from 68.183.191.39 port 61678 ssh2 Sep 25 11:23:19 web1 sshd[11579]: Invalid user karen from 68.183.191.39 port 35538 Sep 25 11:23:19 web1 sshd[11579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.191.39 Sep 25 11:23:19 web1 sshd[11579]: Invalid user karen from 68.183.191.39 port 35538 Sep 25 11:23:20 web1 sshd[11579]: Failed password f ... |
2020-09-25 10:02:05 |
68.183.193.148 | attack | Failed password for root from 68.183.193.148 port 35438 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148 user=root Failed password for root from 68.183.193.148 port 46472 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148 user=root Failed password for root from 68.183.193.148 port 57516 ssh2 |
2020-09-17 18:18:40 |
68.183.193.148 | attackbots | SSH / Telnet Brute Force Attempts on Honeypot |
2020-09-17 09:31:02 |
68.183.198.25 | attack | Automatic report - Port Scan Attack |
2020-09-16 02:12:51 |
68.183.191.39 | attackbots | Invalid user server from 68.183.191.39 port 33804 |
2020-09-16 01:14:30 |
68.183.198.25 | attack | Automatic report - Port Scan Attack |
2020-09-15 18:07:24 |
68.183.191.39 | attack | Invalid user dmdba from 68.183.191.39 port 53522 |
2020-09-15 17:06:19 |
68.183.19.84 | attackspam |
|
2020-09-13 20:39:37 |
68.183.19.84 | attack | " " |
2020-09-13 12:35:08 |
68.183.19.84 | attackbotsspam | Sep 12 20:52:50 ajax sshd[17027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.84 Sep 12 20:52:52 ajax sshd[17027]: Failed password for invalid user aaliyah from 68.183.19.84 port 34436 ssh2 |
2020-09-13 04:22:10 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.183.19.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.183.19.26. IN A
;; AUTHORITY SECTION:
. 592 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021102 1800 900 604800 86400
;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:55:10 CST 2020
;; MSG SIZE rcvd: 116
26.19.183.68.in-addr.arpa domain name pointer kaltim.bawaslu.go.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
26.19.183.68.in-addr.arpa name = kaltim.bawaslu.go.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
146.185.142.200 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-08-19 01:35:50 |
182.61.54.213 | attackspam | Aug 18 15:45:17 server sshd[27568]: Failed password for invalid user albert from 182.61.54.213 port 55652 ssh2 Aug 18 15:47:47 server sshd[31993]: Failed password for invalid user database from 182.61.54.213 port 53262 ssh2 Aug 18 15:50:12 server sshd[4581]: Failed password for invalid user qjx from 182.61.54.213 port 50864 ssh2 |
2020-08-19 01:33:52 |
51.178.81.106 | attackbots | 18.08.2020 18:51:56 - Wordpress fail Detected by ELinOX-ALM |
2020-08-19 01:05:08 |
14.231.53.188 | attackbotsspam | Aug 18 14:31:25 www postfix/smtpd\[11391\]: lost connection after CONNECT from unknown\[14.231.53.188\] |
2020-08-19 01:37:45 |
193.27.228.161 | attackbotsspam | firewall-block, port(s): 34253/tcp, 64071/tcp |
2020-08-19 01:22:08 |
152.136.104.57 | attackspambots | Aug 18 20:24:12 itv-usvr-02 sshd[30311]: Invalid user oat from 152.136.104.57 port 33718 Aug 18 20:24:12 itv-usvr-02 sshd[30311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.104.57 Aug 18 20:24:12 itv-usvr-02 sshd[30311]: Invalid user oat from 152.136.104.57 port 33718 Aug 18 20:24:13 itv-usvr-02 sshd[30311]: Failed password for invalid user oat from 152.136.104.57 port 33718 ssh2 Aug 18 20:28:53 itv-usvr-02 sshd[30480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.104.57 user=root Aug 18 20:28:55 itv-usvr-02 sshd[30480]: Failed password for root from 152.136.104.57 port 51968 ssh2 |
2020-08-19 01:15:12 |
84.228.95.204 | attackbotsspam | SSH login attempts. |
2020-08-19 01:19:53 |
161.35.210.218 | attackbotsspam | Invalid user hbm from 161.35.210.218 port 46304 |
2020-08-19 01:38:20 |
1.174.5.194 | attack | Unauthorized connection attempt from IP address 1.174.5.194 on Port 445(SMB) |
2020-08-19 01:20:32 |
113.173.181.161 | attack | 'IP reached maximum auth failures for a one day block' |
2020-08-19 01:10:11 |
84.232.16.128 | attack | SSH login attempts. |
2020-08-19 01:40:21 |
109.167.200.10 | attackspam | Aug 18 19:01:49 OPSO sshd\[31461\]: Invalid user rogerio from 109.167.200.10 port 32768 Aug 18 19:01:49 OPSO sshd\[31461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10 Aug 18 19:01:51 OPSO sshd\[31461\]: Failed password for invalid user rogerio from 109.167.200.10 port 32768 ssh2 Aug 18 19:05:54 OPSO sshd\[32281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.200.10 user=root Aug 18 19:05:57 OPSO sshd\[32281\]: Failed password for root from 109.167.200.10 port 42894 ssh2 |
2020-08-19 01:07:30 |
23.129.64.189 | attackbotsspam | Aug 18 09:07:01 dignus sshd[22334]: Failed password for root from 23.129.64.189 port 63095 ssh2 Aug 18 09:07:03 dignus sshd[22334]: Failed password for root from 23.129.64.189 port 63095 ssh2 Aug 18 09:07:06 dignus sshd[22334]: Failed password for root from 23.129.64.189 port 63095 ssh2 Aug 18 09:07:08 dignus sshd[22334]: Failed password for root from 23.129.64.189 port 63095 ssh2 Aug 18 09:07:10 dignus sshd[22334]: Failed password for root from 23.129.64.189 port 63095 ssh2 ... |
2020-08-19 01:19:03 |
116.110.49.148 | attackbotsspam | Unauthorized connection attempt from IP address 116.110.49.148 on Port 445(SMB) |
2020-08-19 01:35:13 |
64.145.76.122 | attack | (From info@conniecwilson.cc) Hi, Have you had enough of President Donnie? Welcome to Weekly Wilson's New News. Join us in facing 2020 with as much good humor as we can muster. Progressives, remorseful Republicans, incensed Independents, disillusioned Democrats, Lincoln Project alums—-lend me your ears. Come take a comedic stroll down memory lane with author Connie C. Wilson. Connie has followed presidential politics on the ground for 20 years. She was Content Producer of the Year for Politics (Yahoo, 2008) and is the author of 40 books, 4 of them on presidential races. Order BEE GONE now and we will give you—-absolutely FREE August 16-20—-the children’s e-book version, “The Christmas Cats Flee the Bee,” when you purchase the adult version. This hysterically funny, beautifully illustrated graphic novel just won the E-Lit Gold Medal for graphic novels. In a very short story about a disgruntled drone in a beehive who wants to take over the hive, the take-away is: “Elections have con |
2020-08-19 01:03:30 |