City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 96.142.100.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;96.142.100.52. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011500 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 15 23:52:48 CST 2025
;; MSG SIZE rcvd: 106
Host 52.100.142.96.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 52.100.142.96.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
196.188.192.141 | attack | Unauthorized connection attempt from IP address 196.188.192.141 on Port 445(SMB) |
2019-12-27 07:26:47 |
49.88.112.63 | attackspam | Dec 26 19:56:54 firewall sshd[21213]: Failed password for root from 49.88.112.63 port 44049 ssh2 Dec 26 19:56:57 firewall sshd[21213]: Failed password for root from 49.88.112.63 port 44049 ssh2 Dec 26 19:57:00 firewall sshd[21213]: Failed password for root from 49.88.112.63 port 44049 ssh2 ... |
2019-12-27 07:13:07 |
64.185.3.117 | attack | Repeated failed SSH attempt |
2019-12-27 07:00:34 |
162.144.128.76 | attack | 2019-12-27 00:46:07,736 ncomp.co.za proftpd[4994] mail.ncomp.co.za (server.lux-li.lu[162.144.128.76]): USER forms: no such user found from server.lux-li.lu [162.144.128.76] to ::ffff:172.31.1.100:21 2019-12-27 00:46:09,356 ncomp.co.za proftpd[4995] mail.ncomp.co.za (server.lux-li.lu[162.144.128.76]): USER customer: no such user found from server.lux-li.lu [162.144.128.76] to ::ffff:172.31.1.100:21 2019-12-27 00:46:11,016 ncomp.co.za proftpd[4996] mail.ncomp.co.za (server.lux-li.lu[162.144.128.76]): USER forms: no such user found from server.lux-li.lu [162.144.128.76] to ::ffff:172.31.1.100:21 |
2019-12-27 07:15:01 |
176.113.70.50 | attack | 176.113.70.50 was recorded 10 times by 5 hosts attempting to connect to the following ports: 1900. Incident counter (4h, 24h, all-time): 10, 62, 1017 |
2019-12-27 07:01:47 |
60.166.76.193 | attack | Automatic report - Port Scan Attack |
2019-12-27 07:23:34 |
50.73.116.41 | attack | Detected by Maltrail |
2019-12-27 07:08:31 |
106.54.122.165 | attack | Automatic report - SSH Brute-Force Attack |
2019-12-27 07:02:04 |
66.94.126.50 | attack | invalid user |
2019-12-27 07:10:48 |
189.112.228.153 | attackspambots | Dec 26 23:36:05 sd-53420 sshd\[29956\]: Invalid user server from 189.112.228.153 Dec 26 23:36:05 sd-53420 sshd\[29956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153 Dec 26 23:36:07 sd-53420 sshd\[29956\]: Failed password for invalid user server from 189.112.228.153 port 57710 ssh2 Dec 26 23:46:01 sd-53420 sshd\[1832\]: User root from 189.112.228.153 not allowed because none of user's groups are listed in AllowGroups Dec 26 23:46:01 sd-53420 sshd\[1832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153 user=root ... |
2019-12-27 07:17:51 |
58.216.218.98 | attackspambots | Brute force SMTP login attempts. |
2019-12-27 06:54:08 |
5.148.3.212 | attackspam | Dec 26 22:46:37 IngegnereFirenze sshd[15536]: Failed password for invalid user kalim from 5.148.3.212 port 49989 ssh2 ... |
2019-12-27 06:59:51 |
51.89.231.8 | attackspam | fail2ban - Attack against WordPress |
2019-12-27 06:55:38 |
71.6.233.148 | attackspam | Port 22 Scan, PTR: None |
2019-12-27 06:55:59 |
222.186.175.150 | attackbotsspam | Dec 26 23:56:43 MK-Soft-VM5 sshd[6539]: Failed password for root from 222.186.175.150 port 44380 ssh2 Dec 26 23:56:47 MK-Soft-VM5 sshd[6539]: Failed password for root from 222.186.175.150 port 44380 ssh2 ... |
2019-12-27 07:13:47 |