City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.139.54.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;11.139.54.12. IN A
;; AUTHORITY SECTION:
. 244 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:26:09 CST 2024
;; MSG SIZE rcvd: 105
Host 12.54.139.11.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.54.139.11.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 154.73.174.4 | attackbotsspam | Unauthorized connection attempt detected from IP address 154.73.174.4 to port 2220 [J] |
2020-02-03 23:07:24 |
| 198.108.67.79 | attackspam | firewall-block, port(s): 2048/tcp |
2020-02-03 23:00:18 |
| 114.29.45.108 | attackspam | Feb 3 16:30:26 grey postfix/smtpd\[19335\]: NOQUEUE: reject: RCPT from unknown\[114.29.45.108\]: 554 5.7.1 Service unavailable\; Client host \[114.29.45.108\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[114.29.45.108\]\; from=\ |
2020-02-03 23:49:28 |
| 49.235.134.224 | attack | Automatic report - Banned IP Access |
2020-02-03 23:23:47 |
| 120.71.145.166 | attack | Feb 3 05:40:57 hpm sshd\[18888\]: Invalid user rosa from 120.71.145.166 Feb 3 05:40:57 hpm sshd\[18888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.166 Feb 3 05:40:59 hpm sshd\[18888\]: Failed password for invalid user rosa from 120.71.145.166 port 45694 ssh2 Feb 3 05:46:20 hpm sshd\[19169\]: Invalid user millie from 120.71.145.166 Feb 3 05:46:21 hpm sshd\[19169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.166 |
2020-02-03 23:50:26 |
| 168.90.91.168 | attackbotsspam | Unauthorized connection attempt from IP address 168.90.91.168 on Port 445(SMB) |
2020-02-03 23:43:52 |
| 219.85.118.22 | attackbotsspam | Feb 3 16:30:24 grey postfix/smtpd\[12090\]: NOQUEUE: reject: RCPT from unknown\[219.85.118.22\]: 554 5.7.1 Service unavailable\; Client host \[219.85.118.22\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?219.85.118.22\; from=\ |
2020-02-03 23:48:01 |
| 1.46.224.194 | attack | Unauthorized connection attempt from IP address 1.46.224.194 on Port 445(SMB) |
2020-02-03 23:37:57 |
| 222.186.30.167 | attackbots | Feb 3 15:56:32 MK-Soft-VM8 sshd[2885]: Failed password for root from 222.186.30.167 port 59480 ssh2 Feb 3 15:56:35 MK-Soft-VM8 sshd[2885]: Failed password for root from 222.186.30.167 port 59480 ssh2 ... |
2020-02-03 22:58:58 |
| 222.186.30.145 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root Failed password for root from 222.186.30.145 port 57801 ssh2 Failed password for root from 222.186.30.145 port 57801 ssh2 Failed password for root from 222.186.30.145 port 57801 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root |
2020-02-03 23:38:36 |
| 69.65.79.99 | attackspambots | Automatic report - Port Scan Attack |
2020-02-03 23:05:29 |
| 156.236.110.77 | attack | 10 attempts against mh-pma-try-ban on star |
2020-02-03 23:39:37 |
| 171.251.238.85 | attackspambots | 20/2/3@09:40:18: FAIL: Alarm-Network address from=171.251.238.85 ... |
2020-02-03 23:04:35 |
| 5.182.26.22 | attackspambots | 2020-02-03T16:09:04.153129scmdmz1 sshd[28162]: Invalid user cx from 5.182.26.22 port 33558 2020-02-03T16:09:04.156149scmdmz1 sshd[28162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.182.26.22 2020-02-03T16:09:04.153129scmdmz1 sshd[28162]: Invalid user cx from 5.182.26.22 port 33558 2020-02-03T16:09:05.506841scmdmz1 sshd[28162]: Failed password for invalid user cx from 5.182.26.22 port 33558 ssh2 2020-02-03T16:13:03.572119scmdmz1 sshd[28574]: Invalid user eng from 5.182.26.22 port 60418 ... |
2020-02-03 23:13:32 |
| 178.128.255.8 | attackbotsspam | Unauthorized connection attempt detected from IP address 178.128.255.8 to port 1699 [J] |
2020-02-03 23:14:06 |