City: Samarinda
Region: East Kalimantan
Country: Indonesia
Internet Service Provider: Esia
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.139.172.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;110.139.172.137. IN A
;; AUTHORITY SECTION:
. 374 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021001 1800 900 604800 86400
;; Query time: 280 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 04:09:48 CST 2020
;; MSG SIZE rcvd: 119
137.172.139.110.in-addr.arpa domain name pointer 137.subnet110-139-172.speedy.telkom.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
137.172.139.110.in-addr.arpa name = 137.subnet110-139-172.speedy.telkom.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
180.166.141.58 | attack | [MK-VM2] Blocked by UFW |
2020-05-09 01:30:47 |
220.170.144.20 | attackspambots | 20 attempts against mh-ssh on apple |
2020-05-09 01:48:03 |
95.216.88.167 | attack | 2020-05-09 01:59:25 | |
179.108.250.137 | attack | Unauthorized connection attempt detected from IP address 179.108.250.137 to port 23 |
2020-05-09 01:36:00 |
110.93.200.118 | attackbots | May 8 19:36:19 vmd48417 sshd[6829]: Failed password for root from 110.93.200.118 port 9408 ssh2 |
2020-05-09 01:52:26 |
177.87.150.103 | attackbots | Automatic report - Port Scan Attack |
2020-05-09 01:10:46 |
122.152.208.242 | attack | (sshd) Failed SSH login from 122.152.208.242 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 8 17:34:55 amsweb01 sshd[29913]: User ftp from 122.152.208.242 not allowed because not listed in AllowUsers May 8 17:34:55 amsweb01 sshd[29913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.208.242 user=ftp May 8 17:34:57 amsweb01 sshd[29913]: Failed password for invalid user ftp from 122.152.208.242 port 53858 ssh2 May 8 17:37:51 amsweb01 sshd[30209]: Invalid user jackson from 122.152.208.242 port 51456 May 8 17:37:52 amsweb01 sshd[30209]: Failed password for invalid user jackson from 122.152.208.242 port 51456 ssh2 |
2020-05-09 01:21:55 |
188.166.144.207 | attackbots | 2020-05-08T10:35:34.413082mail.thespaminator.com sshd[2756]: Invalid user web from 188.166.144.207 port 60072 2020-05-08T10:35:36.625680mail.thespaminator.com sshd[2756]: Failed password for invalid user web from 188.166.144.207 port 60072 ssh2 ... |
2020-05-09 01:31:54 |
137.33.102.114 | attackspambots | 05/08/2020-14:11:11.749073 137.33.102.114 Protocol: 6 ET DROP Spamhaus DROP Listed Traffic Inbound group 10 |
2020-05-09 01:40:32 |
80.82.65.253 | attackspambots | 05/08/2020-13:32:01.754309 80.82.65.253 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-09 01:58:07 |
150.109.104.153 | attack | SSH Brute-Force attacks |
2020-05-09 02:03:29 |
185.234.217.164 | attackbots | 2020-05-08T11:33:13.417200linuxbox-skyline auth[29589]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=hello rhost=185.234.217.164 ... |
2020-05-09 01:40:01 |
69.10.62.30 | attack | trying to access non-authorized port |
2020-05-09 01:37:32 |
60.171.155.26 | attack | CMS (WordPress or Joomla) login attempt. |
2020-05-09 01:10:23 |
103.30.14.143 | attackbotsspam | SNORT TCP Port: 25 Classtype misc-attack - ET DROP Spamhaus DROP Listed Traffic Inbound group 5 - - Destination xx.xx.4.1 Port: 25 - - Source 103.30.14.143 Port: 55850 (Listed on barracuda zen-spamhaus spam-sorbs MailSpike (spam wave plus L3-L5)) (163) |
2020-05-09 01:29:10 |