City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.231.8.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.231.8.121. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 19:40:19 CST 2025
;; MSG SIZE rcvd: 105
121.8.231.70.in-addr.arpa domain name pointer 70-231-8-121.lightspeed.tukrga.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
121.8.231.70.in-addr.arpa name = 70-231-8-121.lightspeed.tukrga.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 145.239.29.217 | attackspam | 145.239.29.217 - - \[15/Aug/2020:14:23:07 +0200\] "POST /wp-login.php HTTP/1.0" 200 6718 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 145.239.29.217 - - \[15/Aug/2020:14:23:08 +0200\] "POST /wp-login.php HTTP/1.0" 200 6726 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 145.239.29.217 - - \[15/Aug/2020:14:23:10 +0200\] "POST /wp-login.php HTTP/1.0" 200 6714 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-08-15 22:38:44 |
| 93.64.5.34 | attackbots | Aug 15 14:46:17 onepixel sshd[1641887]: Invalid user P@$$vv0rd!@# from 93.64.5.34 port 64383 Aug 15 14:46:17 onepixel sshd[1641887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34 Aug 15 14:46:17 onepixel sshd[1641887]: Invalid user P@$$vv0rd!@# from 93.64.5.34 port 64383 Aug 15 14:46:18 onepixel sshd[1641887]: Failed password for invalid user P@$$vv0rd!@# from 93.64.5.34 port 64383 ssh2 Aug 15 14:50:07 onepixel sshd[1644105]: Invalid user wsmyaoai!@ from 93.64.5.34 port 12134 |
2020-08-15 23:09:07 |
| 218.92.0.148 | attackspam | SSH auth scanning - multiple failed logins |
2020-08-15 23:01:05 |
| 97.85.196.61 | attack | Aug 15 14:07:28 efa1 sshd[10449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=097-085-196-061.biz.spectrum.com user=admin Aug 15 14:07:30 efa1 sshd[10449]: Failed password for admin from 97.85.196.61 port 42697 ssh2 Aug 15 14:07:31 efa1 sshd[10459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=097-085-196-061.biz.spectrum.com user=admin Aug 15 14:07:33 efa1 sshd[10459]: Failed password for admin from 97.85.196.61 port 42827 ssh2 Aug 15 14:07:35 efa1 sshd[10541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=097-085-196-061.biz.spectrum.com user=admin ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=97.85.196.61 |
2020-08-15 22:48:22 |
| 45.83.67.157 | attackspam | Aug 15 14:15:58 nxxxxxxx sshd[2323]: refused connect from 45.83.67.157 (45.8= 3.67.157) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.83.67.157 |
2020-08-15 23:15:19 |
| 218.92.0.171 | attackbots | "fail2ban match" |
2020-08-15 22:45:19 |
| 112.85.42.173 | attack | Aug 15 16:56:08 * sshd[20060]: Failed password for root from 112.85.42.173 port 34485 ssh2 Aug 15 16:56:21 * sshd[20060]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 34485 ssh2 [preauth] |
2020-08-15 22:57:11 |
| 80.82.77.245 | attackspambots | 3 Attack(s) Detected [DoS Attack: TCP/UDP Chargen] from source: 80.82.77.245, port 49965, Saturday, August 15, 2020 02:36:11 [DoS Attack: TCP/UDP Chargen] from source: 80.82.77.245, port 51904, Saturday, August 15, 2020 02:36:08 [DoS Attack: TCP/UDP Chargen] from source: 80.82.77.245, port 43597, Saturday, August 15, 2020 02:36:00 |
2020-08-15 23:09:27 |
| 40.114.87.176 | attackspambots | CMS Bruteforce / WebApp Attack attempt |
2020-08-15 22:53:31 |
| 222.186.52.131 | attack | Aug 15 14:23:43 ip-172-31-61-156 sshd[24638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.131 user=root Aug 15 14:23:45 ip-172-31-61-156 sshd[24638]: Failed password for root from 222.186.52.131 port 16039 ssh2 ... |
2020-08-15 22:37:05 |
| 39.89.232.137 | attackspam | Unauthorised access (Aug 15) SRC=39.89.232.137 LEN=40 TTL=46 ID=37393 TCP DPT=8080 WINDOW=14513 SYN Unauthorised access (Aug 13) SRC=39.89.232.137 LEN=40 TTL=46 ID=46792 TCP DPT=8080 WINDOW=14513 SYN Unauthorised access (Aug 12) SRC=39.89.232.137 LEN=40 TTL=46 ID=63662 TCP DPT=8080 WINDOW=3964 SYN |
2020-08-15 22:49:39 |
| 113.141.70.115 | attackspam | Port Scan detected! ... |
2020-08-15 22:38:09 |
| 218.201.104.143 | attackbotsspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-08-15 22:43:52 |
| 178.62.75.60 | attack | 2020-08-15T14:15:15.945916mail.broermann.family sshd[19175]: Failed password for root from 178.62.75.60 port 42962 ssh2 2020-08-15T14:19:14.015230mail.broermann.family sshd[19368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60 user=root 2020-08-15T14:19:16.068435mail.broermann.family sshd[19368]: Failed password for root from 178.62.75.60 port 53476 ssh2 2020-08-15T14:23:08.319823mail.broermann.family sshd[19495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60 user=root 2020-08-15T14:23:10.634043mail.broermann.family sshd[19495]: Failed password for root from 178.62.75.60 port 35760 ssh2 ... |
2020-08-15 22:39:53 |
| 222.186.175.169 | attackspam | Aug 15 16:59:35 PorscheCustomer sshd[30797]: Failed password for root from 222.186.175.169 port 53982 ssh2 Aug 15 16:59:38 PorscheCustomer sshd[30797]: Failed password for root from 222.186.175.169 port 53982 ssh2 Aug 15 16:59:41 PorscheCustomer sshd[30797]: Failed password for root from 222.186.175.169 port 53982 ssh2 Aug 15 16:59:49 PorscheCustomer sshd[30797]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 53982 ssh2 [preauth] ... |
2020-08-15 23:05:52 |