City: Calgary
Region: Alberta
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.73.143.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.73.143.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:06:57 CST 2025
;; MSG SIZE rcvd: 106
Host 143.143.73.70.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 143.143.73.70.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 129.211.63.240 | botsattack | 129.211.63.240 - - [10/Jul/2019:12:50:47 +0800] "GET /awstats/index.php?sort=%7B%24%7B%64%69%65%28%6D%64%35%28%44%49%52%45%43%54%4F%52%59%5F%53%45%50%41%52%41%54%4F%52%29%29%7D%7D HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.105 Safari/537.36" 129.211.63.240 - - [10/Jul/2019:12:50:47 +0800] "GET /awstats/awstatstotals.php?sort=%7B%24%7B%64%69%65%28%6D%64%35%28%44%49%52%45%43%54%4F%52%59%5F%53%45%50%41%52%41%54%4F%52%29%29%7D%7D HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.105 Safari/537.36" 129.211.63.240 - - [10/Jul/2019:12:50:47 +0800] "GET /awstatstotals/index.php?sort=%7B%24%7B%64%69%65%28%6D%64%35%28%44%49%52%45%43%54%4F%52%59%5F%53%45%50%41%52%41%54%4F%52%29%29%7D%7D HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.105 Safari/537.36" 129.211.63.240 - - [10/Jul/2019:12:50:47 +0800] "GET /awstatstotals/awstatstotals.php?sort=%7B%24%7B%64%69%65%28%6D%64%35%28%44%49%52%45%43%54%4F%52%59%5F%53%45%50%41%52%41%54%4F%52%29%29%7D%7D HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.105 Safari/537.36" |
2019-07-10 13:06:26 |
| 182.61.164.210 | attackspambots | Jul 10 01:43:39 ns41 sshd[22794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.164.210 Jul 10 01:43:41 ns41 sshd[22794]: Failed password for invalid user billy from 182.61.164.210 port 59682 ssh2 Jul 10 01:45:51 ns41 sshd[22913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.164.210 |
2019-07-10 13:39:46 |
| 134.73.7.200 | attackspam | Jul 10 01:23:48 server postfix/smtpd[21369]: NOQUEUE: reject: RCPT from cheese.sandyfadadu.com[134.73.7.200]: 554 5.7.1 Service unavailable; Client host [134.73.7.200] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2019-07-10 13:10:35 |
| 197.230.82.115 | attackspambots | $f2bV_matches |
2019-07-10 13:12:43 |
| 41.39.71.217 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 19:50:56,653 INFO [shellcode_manager] (41.39.71.217) no match, writing hexdump (4d900835825f83ba0aa7363cb2e134be :14880) - SMB (Unknown) |
2019-07-10 13:23:51 |
| 136.144.156.43 | attackbotsspam | Jul 8 00:06:19 xxx sshd[7183]: Invalid user ambilogger from 136.144.156.43 Jul 8 00:06:21 xxx sshd[7183]: Failed password for invalid user ambilogger from 136.144.156.43 port 51094 ssh2 Jul 8 00:09:21 xxx sshd[7668]: Failed password for r.r from 136.144.156.43 port 54518 ssh2 Jul 8 00:11:29 xxx sshd[7919]: Invalid user filip from 136.144.156.43 Jul 8 00:11:31 xxx sshd[7919]: Failed password for invalid user filip from 136.144.156.43 port 43690 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=136.144.156.43 |
2019-07-10 12:59:43 |
| 217.30.75.78 | attackspam | Jul 9 21:34:25 aat-srv002 sshd[18943]: Failed password for ftp from 217.30.75.78 port 43388 ssh2 Jul 9 21:37:21 aat-srv002 sshd[18975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78 Jul 9 21:37:23 aat-srv002 sshd[18975]: Failed password for invalid user mysql from 217.30.75.78 port 60022 ssh2 Jul 9 21:38:46 aat-srv002 sshd[18991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78 ... |
2019-07-10 13:57:02 |
| 79.166.244.238 | attackspambots | Telnet Server BruteForce Attack |
2019-07-10 13:13:53 |
| 222.101.148.124 | attackspam | Caught in portsentry honeypot |
2019-07-10 13:56:45 |
| 110.185.166.137 | attack | scan r |
2019-07-10 13:16:59 |
| 180.254.192.171 | attack | Telnetd brute force attack detected by fail2ban |
2019-07-10 13:15:07 |
| 222.112.65.55 | attack | Jul 10 01:44:39 ns341937 sshd[32198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.65.55 Jul 10 01:44:41 ns341937 sshd[32198]: Failed password for invalid user moni from 222.112.65.55 port 55128 ssh2 Jul 10 01:47:47 ns341937 sshd[519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.65.55 ... |
2019-07-10 13:48:00 |
| 180.96.28.87 | attackbotsspam | Jul 10 01:20:19 s64-1 sshd[20058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.28.87 Jul 10 01:20:22 s64-1 sshd[20058]: Failed password for invalid user kafka from 180.96.28.87 port 38852 ssh2 Jul 10 01:23:18 s64-1 sshd[20074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.28.87 ... |
2019-07-10 13:20:50 |
| 178.62.47.177 | attack | Jul 10 05:16:35 mail sshd[498]: Invalid user chuan from 178.62.47.177 Jul 10 05:16:35 mail sshd[498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.47.177 Jul 10 05:16:35 mail sshd[498]: Invalid user chuan from 178.62.47.177 Jul 10 05:16:37 mail sshd[498]: Failed password for invalid user chuan from 178.62.47.177 port 52096 ssh2 Jul 10 05:19:42 mail sshd[844]: Invalid user redmine from 178.62.47.177 ... |
2019-07-10 13:38:47 |
| 122.195.200.148 | attackspam | Jul 10 12:05:35 lcl-usvr-02 sshd[5408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148 user=root Jul 10 12:05:36 lcl-usvr-02 sshd[5408]: Failed password for root from 122.195.200.148 port 29944 ssh2 ... |
2019-07-10 13:10:56 |