City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.16.63.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.16.63.139. IN A
;; AUTHORITY SECTION:
. 287 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021122700 1800 900 604800 86400
;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 18:20:14 CST 2021
;; MSG SIZE rcvd: 106
139.63.16.108.in-addr.arpa domain name pointer static-108-16-63-139.phlapa.fios.verizon.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.63.16.108.in-addr.arpa name = static-108-16-63-139.phlapa.fios.verizon.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.105.92.98 | attackbots | Invalid user shrenik from 162.105.92.98 port 60900 |
2019-06-22 13:03:58 |
| 203.114.102.69 | attack | Jun 22 03:52:41 ns41 sshd[8565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69 Jun 22 03:52:41 ns41 sshd[8565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.114.102.69 |
2019-06-22 12:24:11 |
| 220.141.71.166 | attack | 37215/tcp [2019-06-22]1pkt |
2019-06-22 13:03:36 |
| 196.52.43.51 | attackspam | 3493/tcp 5632/udp 5061/tcp... [2019-04-23/06-21]98pkt,53pt.(tcp),8pt.(udp),2proto |
2019-06-22 12:21:39 |
| 139.59.59.187 | attackspambots | Jun 22 06:59:29 herz-der-gamer sshd[20913]: Invalid user beheerder from 139.59.59.187 port 58822 Jun 22 06:59:29 herz-der-gamer sshd[20913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.187 Jun 22 06:59:29 herz-der-gamer sshd[20913]: Invalid user beheerder from 139.59.59.187 port 58822 Jun 22 06:59:31 herz-der-gamer sshd[20913]: Failed password for invalid user beheerder from 139.59.59.187 port 58822 ssh2 ... |
2019-06-22 13:05:00 |
| 162.158.126.94 | attackspambots | 8443/tcp 8443/tcp 8443/tcp... [2019-06-22]4pkt,1pt.(tcp) |
2019-06-22 12:41:28 |
| 95.42.11.240 | attackbotsspam | Jun 22 04:40:53 MK-Soft-VM4 sshd\[22998\]: Invalid user support from 95.42.11.240 port 39727 Jun 22 04:40:53 MK-Soft-VM4 sshd\[22998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.42.11.240 Jun 22 04:40:55 MK-Soft-VM4 sshd\[22998\]: Failed password for invalid user support from 95.42.11.240 port 39727 ssh2 ... |
2019-06-22 12:52:50 |
| 50.67.178.164 | attackspam | Jun 21 22:22:15 nextcloud sshd\[23796\]: Invalid user nginx from 50.67.178.164 Jun 21 22:22:15 nextcloud sshd\[23796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164 Jun 21 22:22:16 nextcloud sshd\[23796\]: Failed password for invalid user nginx from 50.67.178.164 port 56064 ssh2 ... |
2019-06-22 12:26:42 |
| 201.182.66.19 | attackspam | Triggered by Fail2Ban at Ares web server |
2019-06-22 13:02:39 |
| 112.85.42.188 | attack | Jun 22 06:20:48 v22018076622670303 sshd\[11981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.188 user=root Jun 22 06:20:50 v22018076622670303 sshd\[11981\]: Failed password for root from 112.85.42.188 port 54835 ssh2 Jun 22 06:20:52 v22018076622670303 sshd\[11981\]: Failed password for root from 112.85.42.188 port 54835 ssh2 ... |
2019-06-22 12:25:00 |
| 202.154.181.226 | attack | 445/tcp [2019-06-22]1pkt |
2019-06-22 12:45:29 |
| 113.178.75.66 | attackbotsspam | 445/tcp [2019-06-22]1pkt |
2019-06-22 12:46:05 |
| 124.113.219.38 | attackbotsspam | Brute force SMTP login attempts. |
2019-06-22 12:32:35 |
| 61.94.103.123 | attackbots | 445/tcp [2019-06-22]1pkt |
2019-06-22 13:03:19 |
| 54.36.110.42 | attackspam | Bad Request: "\x05\x01\x00" Bad Request: "\x04\x01\x00\x19\xA6\xD8\x95\x81\x00" |
2019-06-22 12:29:33 |