City: unknown
Region: unknown
Country: Romania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.196.242.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.196.242.106. IN A
;; AUTHORITY SECTION:
. 297 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024052601 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 27 01:17:28 CST 2024
;; MSG SIZE rcvd: 107
106.242.196.81.in-addr.arpa domain name pointer static-81-196-242-106.rdsnet.ro.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
106.242.196.81.in-addr.arpa name = static-81-196-242-106.rdsnet.ro.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
114.143.141.98 | attackspam | Sep 30 10:42:15 sso sshd[29145]: Failed password for root from 114.143.141.98 port 60276 ssh2 ... |
2020-10-01 00:05:36 |
222.189.191.169 | attack | Brute forcing email accounts |
2020-10-01 00:27:40 |
74.120.14.17 | attack | firewall-block, port(s): 8888/tcp |
2020-10-01 00:15:40 |
45.148.121.138 | attack |
|
2020-10-01 00:21:08 |
173.18.24.154 | attackbotsspam | leo_www |
2020-10-01 00:32:53 |
92.63.196.23 | attackbotsspam | Found on Github Combined on 3 lists / proto=6 . srcport=40340 . dstport=4155 . (1243) |
2020-10-01 00:11:33 |
84.242.176.138 | attackspambots | [N1.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-10-01 00:13:22 |
103.253.145.89 | attackspam | 2020-09-30T18:01:06.786544ks3355764 sshd[15550]: Failed password for root from 103.253.145.89 port 56834 ssh2 2020-09-30T18:05:10.921620ks3355764 sshd[15581]: Invalid user sistema from 103.253.145.89 port 59584 ... |
2020-10-01 00:08:09 |
150.136.152.190 | attackspambots | Invalid user ubuntu from 150.136.152.190 port 56040 |
2020-10-01 00:02:57 |
24.152.109.157 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-10-01 00:27:23 |
117.107.213.246 | attack | Brute-force attempt banned |
2020-10-01 00:33:50 |
106.13.101.232 | attackbotsspam | Invalid user stats from 106.13.101.232 port 49424 |
2020-10-01 00:07:26 |
114.141.167.190 | attack | Sep 30 13:07:21 ns3164893 sshd[18554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.167.190 Sep 30 13:07:23 ns3164893 sshd[18554]: Failed password for invalid user cvs from 114.141.167.190 port 42631 ssh2 ... |
2020-10-01 00:06:04 |
94.102.51.28 | attack | Port Scan ... |
2020-10-01 00:09:25 |
104.206.128.62 | attackspam | Hit honeypot r. |
2020-10-01 00:07:55 |