City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.131.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.149.131.138. IN A
;; AUTHORITY SECTION:
. 137 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 01:11:32 CST 2022
;; MSG SIZE rcvd: 108
138.131.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.131.149.104.in-addr.arpa name = unassigned.psychz.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.180.203.49 | attackbots | Mailserver and mailaccount attacks |
2020-09-06 14:38:13 |
| 187.87.80.12 | attackspam | 1599324603 - 09/05/2020 18:50:03 Host: 187.87.80.12/187.87.80.12 Port: 445 TCP Blocked |
2020-09-06 14:31:15 |
| 185.59.139.99 | attackspam | Invalid user wzy from 185.59.139.99 port 36394 |
2020-09-06 14:21:05 |
| 213.141.131.22 | attackspam | Invalid user kg from 213.141.131.22 port 54330 |
2020-09-06 14:17:37 |
| 218.92.0.184 | attack | Sep 5 20:33:52 hanapaa sshd\[22992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root Sep 5 20:33:54 hanapaa sshd\[22992\]: Failed password for root from 218.92.0.184 port 23759 ssh2 Sep 5 20:33:57 hanapaa sshd\[22992\]: Failed password for root from 218.92.0.184 port 23759 ssh2 Sep 5 20:34:00 hanapaa sshd\[22992\]: Failed password for root from 218.92.0.184 port 23759 ssh2 Sep 5 20:34:03 hanapaa sshd\[22992\]: Failed password for root from 218.92.0.184 port 23759 ssh2 |
2020-09-06 14:53:42 |
| 192.42.116.22 | attack | Time: Sun Sep 6 06:58:29 2020 +0200 IP: 192.42.116.22 (NL/Netherlands/this-is-a-tor-exit-node-hviv122.hviv.nl) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 6 06:58:18 ca-3-ams1 sshd[4362]: Failed password for root from 192.42.116.22 port 43994 ssh2 Sep 6 06:58:21 ca-3-ams1 sshd[4362]: Failed password for root from 192.42.116.22 port 43994 ssh2 Sep 6 06:58:23 ca-3-ams1 sshd[4362]: Failed password for root from 192.42.116.22 port 43994 ssh2 Sep 6 06:58:25 ca-3-ams1 sshd[4362]: Failed password for root from 192.42.116.22 port 43994 ssh2 Sep 6 06:58:28 ca-3-ams1 sshd[4362]: Failed password for root from 192.42.116.22 port 43994 ssh2 |
2020-09-06 14:10:41 |
| 154.220.96.130 | attackbots | 2020-09-05T15:41:31.859573correo.[domain] sshd[24744]: Failed password for root from 154.220.96.130 port 41072 ssh2 2020-09-05T15:41:34.499858correo.[domain] sshd[24744]: Failed password for root from 154.220.96.130 port 41072 ssh2 2020-09-05T15:41:36.083539correo.[domain] sshd[24744]: Failed password for root from 154.220.96.130 port 41072 ssh2 ... |
2020-09-06 14:23:26 |
| 14.29.215.211 | attackbots | firewall-block, port(s): 6379/tcp |
2020-09-06 14:39:01 |
| 23.160.208.245 | attack | Wordpress malicious attack:[sshd] |
2020-09-06 14:31:01 |
| 220.84.248.58 | attack | 2020-09-06T06:03:12.808584shield sshd\[3085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.248.58 user=root 2020-09-06T06:03:14.697075shield sshd\[3085\]: Failed password for root from 220.84.248.58 port 52756 ssh2 2020-09-06T06:07:29.486329shield sshd\[3527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.248.58 user=root 2020-09-06T06:07:31.334360shield sshd\[3527\]: Failed password for root from 220.84.248.58 port 55750 ssh2 2020-09-06T06:11:43.549161shield sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.248.58 user=root |
2020-09-06 14:17:14 |
| 113.104.242.151 | attack | Aug 31 00:35:58 josie sshd[15614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.242.151 user=r.r Aug 31 00:36:00 josie sshd[15614]: Failed password for r.r from 113.104.242.151 port 10736 ssh2 Aug 31 00:36:01 josie sshd[15615]: Received disconnect from 113.104.242.151: 11: Bye Bye Aug 31 00:38:53 josie sshd[16444]: Invalid user ela from 113.104.242.151 Aug 31 00:38:53 josie sshd[16444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.242.151 Aug 31 00:38:55 josie sshd[16444]: Failed password for invalid user ela from 113.104.242.151 port 10386 ssh2 Aug 31 00:38:55 josie sshd[16446]: Received disconnect from 113.104.242.151: 11: Bye Bye Aug 31 00:43:40 josie sshd[17313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.242.151 user=r.r Aug 31 00:43:42 josie sshd[17313]: Failed password for r.r from 113.104.242.151 port 12079........ ------------------------------- |
2020-09-06 14:46:55 |
| 192.35.169.23 | attackspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-09-06 14:20:39 |
| 167.248.133.24 | attackspambots |
|
2020-09-06 14:24:13 |
| 51.75.64.187 | attackspambots | Brute forcing email accounts |
2020-09-06 14:30:26 |
| 98.176.168.11 | attackspambots | firewall-block, port(s): 81/tcp |
2020-09-06 14:26:20 |