City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.192.39.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.192.39.141. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024122901 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 07:15:00 CST 2024
;; MSG SIZE rcvd: 107
141.39.192.104.in-addr.arpa domain name pointer 104-192-39-141.safewebservices.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
141.39.192.104.in-addr.arpa name = 104-192-39-141.safewebservices.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.29.27.97 | attack | Invalid user test from 111.29.27.97 port 35096 |
2019-09-13 11:55:40 |
| 182.252.0.188 | attackspam | Invalid user odoo from 182.252.0.188 port 57624 |
2019-09-13 11:18:56 |
| 23.96.113.95 | attack | Sep 13 05:12:22 MK-Soft-Root2 sshd\[6147\]: Invalid user bot from 23.96.113.95 port 26252 Sep 13 05:12:22 MK-Soft-Root2 sshd\[6147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.113.95 Sep 13 05:12:24 MK-Soft-Root2 sshd\[6147\]: Failed password for invalid user bot from 23.96.113.95 port 26252 ssh2 ... |
2019-09-13 11:40:43 |
| 88.98.192.83 | attackspambots | Invalid user mailtest from 88.98.192.83 port 49056 |
2019-09-13 11:58:08 |
| 104.244.75.97 | attackspam | Sep 13 02:07:12 XXXXXX sshd[42130]: Invalid user admin from 104.244.75.97 port 33990 |
2019-09-13 11:28:52 |
| 165.22.218.7 | attackbotsspam | Invalid user fake from 165.22.218.7 port 41664 |
2019-09-13 11:22:17 |
| 162.247.74.213 | attackbots | Invalid user zte from 162.247.74.213 port 42038 |
2019-09-13 11:51:48 |
| 99.149.251.77 | attackspambots | Invalid user user from 99.149.251.77 port 48724 |
2019-09-13 11:30:35 |
| 167.71.34.38 | attackspambots | Invalid user student from 167.71.34.38 port 49868 |
2019-09-13 11:21:43 |
| 1.179.137.10 | attackbotsspam | Invalid user server from 1.179.137.10 port 57917 |
2019-09-13 11:41:55 |
| 162.247.74.74 | attack | Invalid user zte from 162.247.74.74 port 54436 |
2019-09-13 11:23:08 |
| 104.236.72.182 | attack | firewall-block, port(s): 3389/tcp |
2019-09-13 11:29:35 |
| 23.129.64.195 | attackbotsspam | Invalid user zte from 23.129.64.195 port 21134 |
2019-09-13 11:39:04 |
| 213.135.239.146 | attackbotsspam | Invalid user vboxuser from 213.135.239.146 port 39319 |
2019-09-13 11:44:20 |
| 120.52.9.102 | attack | Sep 13 05:10:11 v22019058497090703 sshd[20041]: Failed password for root from 120.52.9.102 port 19113 ssh2 Sep 13 05:18:09 v22019058497090703 sshd[20613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102 Sep 13 05:18:12 v22019058497090703 sshd[20613]: Failed password for invalid user hamza from 120.52.9.102 port 34759 ssh2 ... |
2019-09-13 11:54:07 |