City: Rocklin
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Gap, Inc. Direct
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.21.68.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23545
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;8.21.68.242. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019043000 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 30 20:49:04 +08 2019
;; MSG SIZE rcvd: 115
Host 242.68.21.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 242.68.21.8.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
93.66.78.199 | attack | Autoban 93.66.78.199 AUTH/CONNECT |
2019-08-05 07:10:06 |
176.32.34.75 | attackbotsspam | SIP brute force |
2019-08-05 07:13:27 |
128.199.231.239 | attackbotsspam | Aug 5 01:11:45 cp sshd[26446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239 Aug 5 01:11:45 cp sshd[26446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239 Aug 5 01:11:46 cp sshd[26446]: Failed password for invalid user yyy from 128.199.231.239 port 41810 ssh2 |
2019-08-05 07:26:58 |
112.186.77.82 | attackbots | Automatic report - Banned IP Access |
2019-08-05 07:11:19 |
93.40.106.145 | attack | Autoban 93.40.106.145 AUTH/CONNECT |
2019-08-05 07:18:04 |
93.40.231.211 | attackbots | Autoban 93.40.231.211 AUTH/CONNECT |
2019-08-05 07:17:16 |
93.44.104.12 | attackspambots | Autoban 93.44.104.12 AUTH/CONNECT |
2019-08-05 07:12:41 |
93.90.0.20 | attack | Autoban 93.90.0.20 AUTH/CONNECT |
2019-08-05 07:03:51 |
185.137.84.200 | attack | Aug 3 15:05:31 xxx sshd[21648]: Did not receive identification string from 185.137.84.200 port 52368 Aug 3 15:06:57 xxx sshd[21668]: Failed password for r.r from 185.137.84.200 port 38182 ssh2 Aug 3 15:06:57 xxx sshd[21668]: Received disconnect from 185.137.84.200 port 38182:11: Normal Shutdown, Thank you for playing [preauth] Aug 3 15:06:57 xxx sshd[21668]: Disconnected from 185.137.84.200 port 38182 [preauth] Aug 3 15:08:24 xxx sshd[21689]: Failed password for r.r from 185.137.84.200 port 36256 ssh2 Aug 3 15:08:24 xxx sshd[21689]: Received disconnect from 185.137.84.200 port 36256:11: Normal Shutdown, Thank you for playing [preauth] Aug 3 15:08:24 xxx sshd[21689]: Disconnected from 185.137.84.200 port 36256 [preauth] Aug 3 15:09:53 xxx sshd[21818]: Failed password for r.r from 185.137.84.200 port 34330 ssh2 Aug 3 15:09:53 xxx sshd[21818]: Received disconnect from 185.137.84.200 port 34330:11: Normal Shutdown, Thank you for playing [preauth] Aug 3 15:09:53 xx........ ------------------------------- |
2019-08-05 06:55:11 |
93.73.144.76 | attackspambots | Autoban 93.73.144.76 AUTH/CONNECT |
2019-08-05 07:08:20 |
94.152.193.193 | attack | Autoban 94.152.193.193 AUTH/CONNECT |
2019-08-05 06:45:10 |
93.87.75.118 | attackbots | Autoban 93.87.75.118 AUTH/CONNECT |
2019-08-05 07:04:31 |
94.152.193.210 | attackbots | Autoban 94.152.193.210 AUTH/CONNECT |
2019-08-05 06:44:32 |
171.84.2.31 | attackspam | Automatic report - Banned IP Access |
2019-08-05 07:11:04 |
93.44.199.104 | attackbots | Autoban 93.44.199.104 AUTH/CONNECT |
2019-08-05 07:11:40 |