City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.159.138.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.159.138.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 10:59:45 CST 2025
;; MSG SIZE rcvd: 107
Host 74.138.159.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.138.159.103.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.203.197.156 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-04 21:11:05 |
| 222.186.175.155 | attack | Dec 3 19:31:49 microserver sshd[33263]: Failed none for root from 222.186.175.155 port 19444 ssh2 Dec 3 19:31:49 microserver sshd[33263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Dec 3 19:31:51 microserver sshd[33263]: Failed password for root from 222.186.175.155 port 19444 ssh2 Dec 3 19:31:55 microserver sshd[33263]: Failed password for root from 222.186.175.155 port 19444 ssh2 Dec 3 19:31:58 microserver sshd[33263]: Failed password for root from 222.186.175.155 port 19444 ssh2 Dec 3 20:41:50 microserver sshd[43976]: Failed none for root from 222.186.175.155 port 7934 ssh2 Dec 3 20:41:50 microserver sshd[43976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Dec 3 20:41:52 microserver sshd[43976]: Failed password for root from 222.186.175.155 port 7934 ssh2 Dec 3 20:41:55 microserver sshd[43976]: Failed password for root from 222.186.175.155 port 7934 ssh2 De |
2019-12-04 21:16:46 |
| 163.172.50.34 | attackspambots | Dec 4 02:54:38 eddieflores sshd\[9846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.34 user=root Dec 4 02:54:40 eddieflores sshd\[9846\]: Failed password for root from 163.172.50.34 port 56890 ssh2 Dec 4 03:00:55 eddieflores sshd\[10429\]: Invalid user potsdam from 163.172.50.34 Dec 4 03:00:55 eddieflores sshd\[10429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.34 Dec 4 03:00:58 eddieflores sshd\[10429\]: Failed password for invalid user potsdam from 163.172.50.34 port 40136 ssh2 |
2019-12-04 21:17:31 |
| 208.100.26.228 | attackbotsspam | firewall-block, port(s): 119/tcp, 137/tcp |
2019-12-04 21:17:13 |
| 139.59.23.68 | attackbots | 2019-12-04T12:48:20.983447shield sshd\[22151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.68 user=root 2019-12-04T12:48:22.660344shield sshd\[22151\]: Failed password for root from 139.59.23.68 port 39090 ssh2 2019-12-04T12:55:39.516099shield sshd\[24194\]: Invalid user secci from 139.59.23.68 port 50810 2019-12-04T12:55:39.520479shield sshd\[24194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.68 2019-12-04T12:55:41.799209shield sshd\[24194\]: Failed password for invalid user secci from 139.59.23.68 port 50810 ssh2 |
2019-12-04 21:05:31 |
| 218.92.0.202 | attackspambots | Dec 4 12:32:38 legacy sshd[19093]: Failed password for root from 218.92.0.202 port 42849 ssh2 Dec 4 12:34:51 legacy sshd[19181]: Failed password for root from 218.92.0.202 port 39735 ssh2 ... |
2019-12-04 21:18:16 |
| 80.72.95.235 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-12-04 21:43:10 |
| 54.37.157.41 | attackbots | Dec 4 13:07:27 venus sshd\[15336\]: Invalid user ddjj from 54.37.157.41 port 50279 Dec 4 13:07:27 venus sshd\[15336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.41 Dec 4 13:07:29 venus sshd\[15336\]: Failed password for invalid user ddjj from 54.37.157.41 port 50279 ssh2 ... |
2019-12-04 21:24:08 |
| 61.157.91.111 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2019-12-04 21:26:59 |
| 49.51.161.209 | attack | " " |
2019-12-04 21:18:00 |
| 139.59.59.187 | attackspam | Dec 4 13:44:08 cvbnet sshd[12915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187 Dec 4 13:44:11 cvbnet sshd[12915]: Failed password for invalid user cacti from 139.59.59.187 port 35738 ssh2 ... |
2019-12-04 21:23:16 |
| 109.93.88.103 | attack | firewall-block, port(s): 1433/tcp |
2019-12-04 21:33:49 |
| 61.161.237.38 | attackspambots | Dec 4 13:29:30 legacy sshd[21504]: Failed password for backup from 61.161.237.38 port 42064 ssh2 Dec 4 13:36:28 legacy sshd[21755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.237.38 Dec 4 13:36:30 legacy sshd[21755]: Failed password for invalid user jramirez from 61.161.237.38 port 48490 ssh2 ... |
2019-12-04 21:31:09 |
| 132.232.59.136 | attackspambots | 2019-12-04T12:44:03.934878shield sshd\[21077\]: Invalid user emeril from 132.232.59.136 port 46612 2019-12-04T12:44:03.939250shield sshd\[21077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.59.136 2019-12-04T12:44:06.002343shield sshd\[21077\]: Failed password for invalid user emeril from 132.232.59.136 port 46612 ssh2 2019-12-04T12:52:12.259632shield sshd\[23219\]: Invalid user takaki from 132.232.59.136 port 56808 2019-12-04T12:52:12.263811shield sshd\[23219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.59.136 |
2019-12-04 21:10:21 |
| 192.99.247.232 | attackbotsspam | 2019-12-04T13:28:51.837895abusebot-3.cloudsearch.cf sshd\[15956\]: Invalid user password999 from 192.99.247.232 port 40520 |
2019-12-04 21:43:56 |