City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.63.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.149.63.138. IN A
;; AUTHORITY SECTION:
. 317 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031500 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 01:16:54 CST 2022
;; MSG SIZE rcvd: 107
Host 138.63.149.104.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 138.63.149.104.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
159.89.86.142 | attackspambots | SSH Brute Force |
2020-09-16 02:39:37 |
167.71.38.104 | attackspambots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-09-16 02:15:47 |
167.56.252.141 | attackbots | Icarus honeypot on github |
2020-09-16 02:35:40 |
51.89.68.141 | attackspambots | $f2bV_matches |
2020-09-16 02:47:09 |
181.129.14.218 | attack | Sep 15 16:28:35 vm1 sshd[25020]: Failed password for root from 181.129.14.218 port 43312 ssh2 ... |
2020-09-16 02:34:59 |
81.68.100.138 | attackbotsspam | (sshd) Failed SSH login from 81.68.100.138 (CN/China/-): 5 in the last 3600 secs |
2020-09-16 02:33:10 |
186.1.12.67 | attackspambots | Automatic report - Banned IP Access |
2020-09-16 02:22:08 |
68.183.110.49 | attackbotsspam | 2020-09-15T16:33:58.856608vps-d63064a2 sshd[25644]: Invalid user hesketh from 68.183.110.49 port 43172 2020-09-15T16:34:00.955593vps-d63064a2 sshd[25644]: Failed password for invalid user hesketh from 68.183.110.49 port 43172 ssh2 2020-09-15T16:37:54.517484vps-d63064a2 sshd[25697]: Invalid user arumi from 68.183.110.49 port 56206 2020-09-15T16:37:54.527417vps-d63064a2 sshd[25697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49 2020-09-15T16:37:54.517484vps-d63064a2 sshd[25697]: Invalid user arumi from 68.183.110.49 port 56206 2020-09-15T16:37:56.683332vps-d63064a2 sshd[25697]: Failed password for invalid user arumi from 68.183.110.49 port 56206 ssh2 ... |
2020-09-16 02:38:36 |
129.204.33.4 | attack | 2020-09-15T06:47:05.028915hostname sshd[86359]: Failed password for root from 129.204.33.4 port 37418 ssh2 ... |
2020-09-16 02:16:00 |
93.147.129.222 | attackbots | 2020-09-15T17:17:36.911065abusebot-2.cloudsearch.cf sshd[25093]: Invalid user jon from 93.147.129.222 port 44198 2020-09-15T17:17:36.920101abusebot-2.cloudsearch.cf sshd[25093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-93-147-129-222.cust.vodafonedsl.it 2020-09-15T17:17:36.911065abusebot-2.cloudsearch.cf sshd[25093]: Invalid user jon from 93.147.129.222 port 44198 2020-09-15T17:17:38.751471abusebot-2.cloudsearch.cf sshd[25093]: Failed password for invalid user jon from 93.147.129.222 port 44198 ssh2 2020-09-15T17:21:26.025925abusebot-2.cloudsearch.cf sshd[25243]: Invalid user lsfadmin from 93.147.129.222 port 55894 2020-09-15T17:21:26.033718abusebot-2.cloudsearch.cf sshd[25243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-93-147-129-222.cust.vodafonedsl.it 2020-09-15T17:21:26.025925abusebot-2.cloudsearch.cf sshd[25243]: Invalid user lsfadmin from 93.147.129.222 port 55894 2020-09-15T17:21 ... |
2020-09-16 02:44:45 |
68.79.60.45 | attackspambots | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-09-16 02:31:06 |
49.255.93.10 | attackspam | Sep 16 02:49:18 NG-HHDC-SVS-001 sshd[24538]: Invalid user default from 49.255.93.10 ... |
2020-09-16 02:40:37 |
167.71.235.133 | attackspambots | Sep 15 14:33:18 h2646465 sshd[32721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.235.133 user=root Sep 15 14:33:19 h2646465 sshd[32721]: Failed password for root from 167.71.235.133 port 40308 ssh2 Sep 15 14:54:19 h2646465 sshd[3038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.235.133 user=root Sep 15 14:54:21 h2646465 sshd[3038]: Failed password for root from 167.71.235.133 port 41194 ssh2 Sep 15 15:01:18 h2646465 sshd[4631]: Invalid user fujita from 167.71.235.133 Sep 15 15:01:18 h2646465 sshd[4631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.235.133 Sep 15 15:01:18 h2646465 sshd[4631]: Invalid user fujita from 167.71.235.133 Sep 15 15:01:20 h2646465 sshd[4631]: Failed password for invalid user fujita from 167.71.235.133 port 35566 ssh2 Sep 15 15:07:45 h2646465 sshd[5276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser |
2020-09-16 02:46:56 |
212.119.190.162 | attack | Sep 15 18:27:54 django-0 sshd[5093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp.swedmobil.ru user=root Sep 15 18:27:56 django-0 sshd[5093]: Failed password for root from 212.119.190.162 port 50431 ssh2 ... |
2020-09-16 02:45:11 |
41.111.135.196 | attack | Sep 14 20:05:01 mout sshd[23846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.135.196 user=root Sep 14 20:05:03 mout sshd[23846]: Failed password for root from 41.111.135.196 port 58842 ssh2 |
2020-09-16 02:17:29 |