City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.16.134.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.16.134.140. IN A
;; AUTHORITY SECTION:
. 358 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:17:55 CST 2022
;; MSG SIZE rcvd: 107
140.134.16.103.in-addr.arpa domain name pointer aipt-01.stack.host.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.134.16.103.in-addr.arpa name = aipt-01.stack.host.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
109.236.60.42 | attackspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-06-02 04:09:11 |
222.186.180.142 | attackbotsspam | Unauthorized connection attempt detected from IP address 222.186.180.142 to port 22 |
2020-06-02 04:41:34 |
36.72.166.229 | attack | 1591012907 - 06/01/2020 14:01:47 Host: 36.72.166.229/36.72.166.229 Port: 445 TCP Blocked |
2020-06-02 04:15:34 |
118.25.74.199 | attackbots | Jun 1 12:48:56 dignus sshd[11895]: Failed password for root from 118.25.74.199 port 41766 ssh2 Jun 1 12:50:10 dignus sshd[12012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199 user=root Jun 1 12:50:12 dignus sshd[12012]: Failed password for root from 118.25.74.199 port 55806 ssh2 Jun 1 12:51:23 dignus sshd[12105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.74.199 user=root Jun 1 12:51:26 dignus sshd[12105]: Failed password for root from 118.25.74.199 port 41618 ssh2 ... |
2020-06-02 04:21:31 |
181.48.225.126 | attackspambots | Jun 1 21:25:04 * sshd[16218]: Failed password for root from 181.48.225.126 port 52862 ssh2 |
2020-06-02 04:18:12 |
49.206.124.190 | attackbots | 1591012940 - 06/01/2020 14:02:20 Host: 49.206.124.190/49.206.124.190 Port: 445 TCP Blocked |
2020-06-02 04:05:45 |
182.73.40.181 | attackbots | Tried sshing with brute force. |
2020-06-02 04:23:05 |
14.161.18.170 | attackspam | Dovecot Invalid User Login Attempt. |
2020-06-02 04:09:48 |
139.59.84.29 | attackspam | Jun 1 22:17:06 [host] sshd[13791]: pam_unix(sshd: Jun 1 22:17:07 [host] sshd[13791]: Failed passwor Jun 1 22:20:55 [host] sshd[13875]: pam_unix(sshd: |
2020-06-02 04:23:36 |
101.187.123.101 | attackspam | Jun 1 22:15:55 amit sshd\[15560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.187.123.101 user=root Jun 1 22:15:57 amit sshd\[15560\]: Failed password for root from 101.187.123.101 port 52134 ssh2 Jun 1 22:22:56 amit sshd\[24711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.187.123.101 user=root ... |
2020-06-02 04:41:11 |
117.33.128.218 | attackspam | Jun 1 21:18:42 ajax sshd[17522]: Failed password for root from 117.33.128.218 port 45390 ssh2 |
2020-06-02 04:38:56 |
112.15.38.248 | attackbots | (pop3d) Failed POP3 login from 112.15.38.248 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 1 17:40:42 ir1 dovecot[2885757]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user= |
2020-06-02 04:21:52 |
198.50.136.143 | attack | Jun 1 22:31:31 srv-ubuntu-dev3 sshd[32490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.136.143 user=root Jun 1 22:31:33 srv-ubuntu-dev3 sshd[32490]: Failed password for root from 198.50.136.143 port 58820 ssh2 Jun 1 22:32:44 srv-ubuntu-dev3 sshd[32681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.136.143 user=root Jun 1 22:32:46 srv-ubuntu-dev3 sshd[32681]: Failed password for root from 198.50.136.143 port 51202 ssh2 Jun 1 22:33:58 srv-ubuntu-dev3 sshd[32837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.136.143 user=root Jun 1 22:34:00 srv-ubuntu-dev3 sshd[32837]: Failed password for root from 198.50.136.143 port 43480 ssh2 Jun 1 22:35:12 srv-ubuntu-dev3 sshd[33022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.136.143 user=root Jun 1 22:35:14 srv-ubuntu-dev3 sshd[33022]: F ... |
2020-06-02 04:39:31 |
192.119.73.121 | attack | SpamScore above: 10.0 |
2020-06-02 04:16:03 |
185.234.216.87 | attackspam | 2020-06-01T14:01:32+02:00 |
2020-06-02 04:11:09 |