City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.138.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.19.138.72. IN A
;; AUTHORITY SECTION:
. 597 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 15:41:14 CST 2022
;; MSG SIZE rcvd: 106
Host 72.138.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 72.138.19.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
51.161.12.231 | attackspambots | Port Scan ... |
2020-10-01 07:16:33 |
92.63.197.53 | attackspambots | srv02 Mass scanning activity detected Target: 4619 .. |
2020-10-01 07:42:14 |
45.143.221.97 | attackspambots |
|
2020-10-01 07:18:29 |
106.13.189.172 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-10-01 07:38:11 |
104.206.128.62 | attackbotsspam |
|
2020-10-01 07:39:25 |
94.102.56.216 | attackspam | 94.102.56.216 was recorded 6 times by 4 hosts attempting to connect to the following ports: 7659,7748. Incident counter (4h, 24h, all-time): 6, 26, 2934 |
2020-10-01 07:09:24 |
83.97.20.35 | attackbots | firewall-block, port(s): 3333/tcp, 5007/tcp, 7779/tcp, 8333/tcp, 8554/tcp, 8834/tcp |
2020-10-01 07:14:54 |
92.118.161.53 | attackbotsspam |
|
2020-10-01 07:10:55 |
5.189.130.92 | attackspambots | firewall-block, port(s): 5038/tcp |
2020-10-01 07:25:14 |
139.59.57.2 | attack | 2020-09-30T18:58:27.0319611495-001 sshd[24174]: Invalid user postgres from 139.59.57.2 port 38182 2020-09-30T18:58:28.9923601495-001 sshd[24174]: Failed password for invalid user postgres from 139.59.57.2 port 38182 ssh2 2020-09-30T19:01:48.3197441495-001 sshd[24371]: Invalid user jerry from 139.59.57.2 port 33216 2020-09-30T19:01:48.3238011495-001 sshd[24371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2 2020-09-30T19:01:48.3197441495-001 sshd[24371]: Invalid user jerry from 139.59.57.2 port 33216 2020-09-30T19:01:50.2062181495-001 sshd[24371]: Failed password for invalid user jerry from 139.59.57.2 port 33216 ssh2 ... |
2020-10-01 07:35:24 |
120.42.132.232 | attackspambots | Brute forcing email accounts |
2020-10-01 07:05:30 |
170.130.187.38 | attackbots |
|
2020-10-01 07:32:10 |
150.136.152.190 | attackspambots | Invalid user ubuntu from 150.136.152.190 port 56040 |
2020-10-01 07:34:15 |
170.130.187.2 | attackbots |
|
2020-10-01 07:32:28 |
101.251.219.100 | attack |
|
2020-10-01 07:08:57 |