City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.193.30.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23607
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.193.30.10. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 09:23:25 CST 2025
;; MSG SIZE rcvd: 106
Host 10.30.193.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 10.30.193.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
195.9.146.198 | attackspam | Unauthorized connection attempt from IP address 195.9.146.198 on Port 445(SMB) |
2019-07-12 09:36:26 |
181.211.13.51 | attackbots | Unauthorized connection attempt from IP address 181.211.13.51 on Port 445(SMB) |
2019-07-12 09:46:22 |
185.222.211.235 | attackspambots | Jul 12 03:33:52 relay postfix/smtpd\[7907\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.235\]: 554 5.7.1 \ |
2019-07-12 09:48:50 |
24.200.120.18 | attackspam | Thu 11 18:38:32 53884/tcp Thu 11 18:38:32 53884/tcp Thu 11 18:38:32 53884/tcp Thu 11 18:38:32 53884/tcp Thu 11 18:38:32 53884/tcp Thu 11 18:38:32 53884/tcp |
2019-07-12 09:33:42 |
159.65.175.37 | attackbotsspam | 2019-07-12T00:41:12.158361abusebot-5.cloudsearch.cf sshd\[14800\]: Invalid user ftpuser from 159.65.175.37 port 55898 |
2019-07-12 09:27:38 |
193.32.163.182 | attack | Jul 12 01:16:34 localhost sshd\[29355\]: Invalid user admin from 193.32.163.182 port 58163 Jul 12 01:16:34 localhost sshd\[29355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 Jul 12 01:16:36 localhost sshd\[29355\]: Failed password for invalid user admin from 193.32.163.182 port 58163 ssh2 ... |
2019-07-12 09:41:58 |
123.30.51.43 | attackspambots | Unauthorized connection attempt from IP address 123.30.51.43 on Port 445(SMB) |
2019-07-12 09:56:05 |
140.143.130.52 | attackbots | 2019-07-12T03:44:48.326476lon01.zurich-datacenter.net sshd\[27271\]: Invalid user rstudio from 140.143.130.52 port 40260 2019-07-12T03:44:48.331377lon01.zurich-datacenter.net sshd\[27271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.130.52 2019-07-12T03:44:49.977640lon01.zurich-datacenter.net sshd\[27271\]: Failed password for invalid user rstudio from 140.143.130.52 port 40260 ssh2 2019-07-12T03:47:53.078631lon01.zurich-datacenter.net sshd\[27355\]: Invalid user gorges from 140.143.130.52 port 42134 2019-07-12T03:47:53.085342lon01.zurich-datacenter.net sshd\[27355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.130.52 ... |
2019-07-12 09:50:12 |
119.29.242.84 | attack | Jul 12 02:17:23 localhost sshd\[35407\]: Invalid user mmm from 119.29.242.84 port 56474 Jul 12 02:17:23 localhost sshd\[35407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.242.84 ... |
2019-07-12 09:26:22 |
125.22.76.77 | attackspambots | 2019-07-12T01:43:27.249505abusebot-8.cloudsearch.cf sshd\[23231\]: Invalid user membership from 125.22.76.77 port 30125 |
2019-07-12 10:11:33 |
222.124.200.19 | attack | Unauthorized connection attempt from IP address 222.124.200.19 on Port 445(SMB) |
2019-07-12 09:57:08 |
122.52.122.194 | attackspam | Unauthorized connection attempt from IP address 122.52.122.194 on Port 445(SMB) |
2019-07-12 10:16:16 |
112.133.194.232 | attackbotsspam | Unauthorized connection attempt from IP address 112.133.194.232 on Port 445(SMB) |
2019-07-12 09:52:48 |
117.50.12.10 | attackspam | 2019-07-12T01:14:07.267960abusebot-4.cloudsearch.cf sshd\[30579\]: Invalid user foo from 117.50.12.10 port 59964 |
2019-07-12 09:26:50 |
95.91.8.75 | attackbots | Jul 12 03:07:13 s64-1 sshd[2261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.91.8.75 Jul 12 03:07:14 s64-1 sshd[2261]: Failed password for invalid user debian from 95.91.8.75 port 56122 ssh2 Jul 12 03:12:55 s64-1 sshd[2320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.91.8.75 ... |
2019-07-12 09:35:34 |