City: unknown
Region: unknown
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.69.46.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.69.46.139. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022502 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 05:57:14 CST 2022
;; MSG SIZE rcvd: 106
139.46.69.103.in-addr.arpa domain name pointer static-139-46-69-103.navyug.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.46.69.103.in-addr.arpa name = static-139-46-69-103.navyug.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
177.11.2.63 | attackspam | 445/tcp 445/tcp [2019-10-12/11-19]2pkt |
2019-11-20 07:23:36 |
82.76.18.43 | attackbots | 23/tcp 23/tcp 23/tcp [2019-10-12/11-19]3pkt |
2019-11-20 07:48:58 |
41.39.89.105 | attackbotsspam | 3389/tcp 3389/tcp [2019-10-06/11-19]2pkt |
2019-11-20 07:31:12 |
190.36.255.87 | attackbotsspam | 23/tcp 23/tcp 23/tcp [2019-10-09/11-19]3pkt |
2019-11-20 07:34:14 |
212.92.101.89 | attackspam | Lines containing failures of 212.92.101.89 Nov x@x Nov x@x Nov x@x Nov 19 20:59:09 omfg postfix-submission/smtpd[13285]: connect from unknown[212.92.101.89] Nov 19 20:59:09 omfg postfix-submission/smtpd[13285]: lost connection after UNKNOWN from unknown[212.92.101.89] Nov 19 20:59:09 omfg postfix-submission/smtpd[13285]: disconnect from unknown[212.92.101.89] unknown=0/1 commands=0/1 Nov 19 20:59:14 omfg postfix-submission/smtpd[13285]: connect from unknown[212.92.101.89] Nov 19 20:59:14 omfg postfix-submission/smtpd[13285]: lost connection after UNKNOWN from unknown[212.92.101.89] Nov 19 20:59:14 omfg postfix-submission/smtpd[13285]: disconnect from unknown[212.92.101.89] unknown=0/1 commands=0/1 Nov 19 20:59:27 omfg postfix-submission/smtpd[13285]: connect from unknown[212.92.101.89] Nov 19 20:59:27 omfg postfix-submission/smtpd[13285]: lost connection after UNKNOWN from unknown[212.92.101.89] Nov 19 20:59:27 omfg postfix-submission/smtpd[13285]: disconnect from unknow........ ------------------------------ |
2019-11-20 07:46:10 |
128.199.52.45 | attackspam | 2019-11-19T23:23:37.571664shield sshd\[31703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45 user=ftp 2019-11-19T23:23:39.823754shield sshd\[31703\]: Failed password for ftp from 128.199.52.45 port 55432 ssh2 2019-11-19T23:27:24.648213shield sshd\[32608\]: Invalid user yahoo from 128.199.52.45 port 35214 2019-11-19T23:27:24.652330shield sshd\[32608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45 2019-11-19T23:27:27.065302shield sshd\[32608\]: Failed password for invalid user yahoo from 128.199.52.45 port 35214 ssh2 |
2019-11-20 07:38:32 |
212.64.7.134 | attackspambots | Nov 19 00:51:12 : SSH login attempts with invalid user |
2019-11-20 07:13:52 |
223.244.236.232 | attackbotsspam | 37215/tcp 23/tcp... [2019-09-29/11-19]52pkt,2pt.(tcp) |
2019-11-20 07:27:20 |
76.73.206.90 | attackspam | 2019-11-19T18:05:15.8622531495-001 sshd\[20838\]: Invalid user hillary from 76.73.206.90 port 64196 2019-11-19T18:05:15.8712611495-001 sshd\[20838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90 2019-11-19T18:05:17.8378681495-001 sshd\[20838\]: Failed password for invalid user hillary from 76.73.206.90 port 64196 ssh2 2019-11-19T18:09:14.4028231495-001 sshd\[20981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90 user=daemon 2019-11-19T18:09:16.8459541495-001 sshd\[20981\]: Failed password for daemon from 76.73.206.90 port 44614 ssh2 2019-11-19T18:13:07.9484151495-001 sshd\[21099\]: Invalid user zenenko from 76.73.206.90 port 5204 2019-11-19T18:13:07.9517991495-001 sshd\[21099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90 ... |
2019-11-20 07:39:30 |
217.182.70.125 | attackbots | 2019-11-20T00:24:10.432467scmdmz1 sshd\[23439\]: Invalid user sbin from 217.182.70.125 port 55307 2019-11-20T00:24:10.436392scmdmz1 sshd\[23439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-70.eu 2019-11-20T00:24:12.258081scmdmz1 sshd\[23439\]: Failed password for invalid user sbin from 217.182.70.125 port 55307 ssh2 ... |
2019-11-20 07:45:18 |
106.53.90.75 | attackbots | 2019-11-19T23:14:18.027266abusebot-6.cloudsearch.cf sshd\[24812\]: Invalid user fvial from 106.53.90.75 port 54762 |
2019-11-20 07:39:16 |
120.192.150.234 | attackbots | 1433/tcp 1433/tcp 1433/tcp... [2019-10-20/11-19]5pkt,1pt.(tcp) |
2019-11-20 07:16:11 |
159.203.201.63 | attackspambots | proto=tcp . spt=39952 . dpt=3389 . src=159.203.201.63 . dst=xx.xx.4.1 . (Found on CINS badguys Nov 19) (636) |
2019-11-20 07:27:44 |
202.61.120.218 | attackspambots | 445/tcp 445/tcp 445/tcp [2019-10-11/11-19]3pkt |
2019-11-20 07:40:37 |
193.70.90.59 | attackspam | k+ssh-bruteforce |
2019-11-20 07:25:13 |