City: unknown
Region: Panevezys
Country: Lithuania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.142.203.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;90.142.203.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 02:01:02 CST 2024
;; MSG SIZE rcvd: 106
31.203.142.90.in-addr.arpa domain name pointer m90-142-203-31.cust.tele2.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.203.142.90.in-addr.arpa name = m90-142-203-31.cust.tele2.lt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
127.0.0.1 | attackspam | Test Connectivity |
2020-05-06 03:47:26 |
51.75.76.201 | attack | May 5 20:58:14 vpn01 sshd[6191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.76.201 May 5 20:58:16 vpn01 sshd[6191]: Failed password for invalid user aastorp from 51.75.76.201 port 40860 ssh2 ... |
2020-05-06 03:30:49 |
24.181.67.58 | attackbotsspam | May 4 08:13:49 24.181.67.58 PROTO=TCP SPT=47593 DPT=23 May 4 08:41:15 24.181.67.58 PROTO=TCP SPT=36046 DPT=23 May 4 10:08:36 24.181.67.58 PROTO=TCP SPT=46722 DPT=23 May 4 11:09:53 24.181.67.58 PROTO=TCP SPT=42359 DPT=23 May 4 12:04:20 24.181.67.58 PROTO=TCP SPT=902 DPT=23 |
2020-05-06 03:34:44 |
222.186.173.154 | attackspambots | May 5 15:31:45 NPSTNNYC01T sshd[6632]: Failed password for root from 222.186.173.154 port 40988 ssh2 May 5 15:31:57 NPSTNNYC01T sshd[6632]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 40988 ssh2 [preauth] May 5 15:32:03 NPSTNNYC01T sshd[6638]: Failed password for root from 222.186.173.154 port 6760 ssh2 ... |
2020-05-06 03:32:36 |
185.234.219.54 | attack | Feb 25 13:00:01 WHD8 postfix/smtpd\[99200\]: warning: unknown\[185.234.219.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 25 13:09:38 WHD8 postfix/smtpd\[100318\]: warning: unknown\[185.234.219.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 25 13:17:50 WHD8 postfix/smtpd\[101638\]: warning: unknown\[185.234.219.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-06 04:02:44 |
185.50.149.9 | attackbots | May 5 20:55:55 mail postfix/smtpd\[3088\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 5 20:56:17 mail postfix/smtpd\[2823\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 5 21:51:07 mail postfix/smtpd\[4691\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 5 21:51:30 mail postfix/smtpd\[4645\]: warning: unknown\[185.50.149.9\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-05-06 03:54:08 |
167.114.131.19 | attackbotsspam | May 5 19:52:36 home sshd[1814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.131.19 May 5 19:52:38 home sshd[1814]: Failed password for invalid user yuh from 167.114.131.19 port 37413 ssh2 May 5 19:56:40 home sshd[2439]: Failed password for root from 167.114.131.19 port 47636 ssh2 ... |
2020-05-06 03:29:32 |
185.50.149.26 | attack | May 5 21:31:00 websrv1.aknwsrv.net postfix/smtpd[432917]: warning: unknown[185.50.149.26]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 5 21:31:01 websrv1.aknwsrv.net postfix/smtpd[432917]: lost connection after AUTH from unknown[185.50.149.26] May 5 21:31:07 websrv1.aknwsrv.net postfix/smtpd[432917]: lost connection after AUTH from unknown[185.50.149.26] May 5 21:31:20 websrv1.aknwsrv.net postfix/smtpd[432917]: warning: unknown[185.50.149.26]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 5 21:31:20 websrv1.aknwsrv.net postfix/smtpd[432917]: lost connection after AUTH from unknown[185.50.149.26] |
2020-05-06 03:57:02 |
185.234.219.101 | attackbots | Mar 10 15:42:19 WHD8 postfix/smtpd\[65955\]: warning: unknown\[185.234.219.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 10 16:00:04 WHD8 postfix/smtpd\[67110\]: warning: unknown\[185.234.219.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 10 16:15:00 WHD8 postfix/smtpd\[67970\]: warning: unknown\[185.234.219.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-06 04:02:20 |
49.88.112.112 | attack | May 5 15:14:13 plusreed sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112 user=root May 5 15:14:15 plusreed sshd[25465]: Failed password for root from 49.88.112.112 port 18945 ssh2 ... |
2020-05-06 03:25:38 |
37.209.40.219 | attackbots | May 5 18:00:12 internal-server-tf sshd\[3328\]: Invalid user pi from 37.209.40.219May 5 18:00:12 internal-server-tf sshd\[3330\]: Invalid user pi from 37.209.40.219 ... |
2020-05-06 03:27:34 |
159.89.171.121 | attack | 2020-05-05T14:39:08.5346031495-001 sshd[43697]: Failed password for invalid user oper01 from 159.89.171.121 port 54152 ssh2 2020-05-05T14:43:27.6643821495-001 sshd[43905]: Invalid user cas from 159.89.171.121 port 36462 2020-05-05T14:43:27.6677681495-001 sshd[43905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.letsthankyou.com 2020-05-05T14:43:27.6643821495-001 sshd[43905]: Invalid user cas from 159.89.171.121 port 36462 2020-05-05T14:43:29.6846001495-001 sshd[43905]: Failed password for invalid user cas from 159.89.171.121 port 36462 ssh2 2020-05-05T14:47:41.2940611495-001 sshd[44144]: Invalid user tir from 159.89.171.121 port 47004 ... |
2020-05-06 03:57:58 |
217.133.58.148 | attackspam | May 5 19:52:22 Ubuntu-1404-trusty-64-minimal sshd\[27037\]: Invalid user usu from 217.133.58.148 May 5 19:52:22 Ubuntu-1404-trusty-64-minimal sshd\[27037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.58.148 May 5 19:52:24 Ubuntu-1404-trusty-64-minimal sshd\[27037\]: Failed password for invalid user usu from 217.133.58.148 port 58103 ssh2 May 5 19:56:32 Ubuntu-1404-trusty-64-minimal sshd\[28841\]: Invalid user manu from 217.133.58.148 May 5 19:56:32 Ubuntu-1404-trusty-64-minimal sshd\[28841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.58.148 |
2020-05-06 03:35:36 |
75.179.34.169 | attack | Automatic report - Port Scan Attack |
2020-05-06 03:55:47 |
222.186.175.216 | attackbots | 2020-05-05T19:59:01.113002abusebot-6.cloudsearch.cf sshd[8020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root 2020-05-05T19:59:03.570111abusebot-6.cloudsearch.cf sshd[8020]: Failed password for root from 222.186.175.216 port 51726 ssh2 2020-05-05T19:59:06.637295abusebot-6.cloudsearch.cf sshd[8020]: Failed password for root from 222.186.175.216 port 51726 ssh2 2020-05-05T19:59:01.113002abusebot-6.cloudsearch.cf sshd[8020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root 2020-05-05T19:59:03.570111abusebot-6.cloudsearch.cf sshd[8020]: Failed password for root from 222.186.175.216 port 51726 ssh2 2020-05-05T19:59:06.637295abusebot-6.cloudsearch.cf sshd[8020]: Failed password for root from 222.186.175.216 port 51726 ssh2 2020-05-05T19:59:01.113002abusebot-6.cloudsearch.cf sshd[8020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ... |
2020-05-06 04:01:54 |