City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.193.49.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.193.49.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 12:06:05 CST 2025
;; MSG SIZE rcvd: 106
Host 81.49.193.129.in-addr.arpa not found: 2(SERVFAIL)
server can't find 129.193.49.81.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.212.197.127 | attack | Brute force blocker - service: proftpd1, proftpd2 - aantal: 79 - Wed Apr 11 07:25:15 2018 |
2020-03-09 04:33:05 |
| 125.44.28.247 | attack | 1583673317 - 03/08/2020 14:15:17 Host: 125.44.28.247/125.44.28.247 Port: 23 TCP Blocked |
2020-03-09 04:13:03 |
| 139.189.183.184 | attackspambots | Brute force blocker - service: proftpd1 - aantal: 125 - Fri Apr 13 03:25:13 2018 |
2020-03-09 04:22:11 |
| 183.63.155.146 | attack | Brute force blocker - service: proftpd1 - aantal: 142 - Fri Apr 13 12:40:13 2018 |
2020-03-09 04:15:11 |
| 121.33.114.199 | attackspam | Brute force blocker - service: proftpd1 - aantal: 147 - Tue Apr 10 11:00:16 2018 |
2020-03-09 04:39:04 |
| 51.254.36.55 | attack | Fail2Ban Ban Triggered |
2020-03-09 04:22:50 |
| 124.205.214.162 | attackbots | Brute force blocker - service: proftpd1 - aantal: 148 - Wed Apr 11 05:45:15 2018 |
2020-03-09 04:37:07 |
| 119.39.103.81 | attackbots | Brute force blocker - service: proftpd1 - aantal: 57 - Thu Apr 12 02:50:15 2018 |
2020-03-09 04:25:10 |
| 49.35.96.162 | attackspam | Unauthorized connection attempt from IP address 49.35.96.162 on Port 445(SMB) |
2020-03-09 04:11:34 |
| 212.129.138.198 | attackspam | Nov 21 22:16:13 ms-srv sshd[53269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198 user=nobody Nov 21 22:16:15 ms-srv sshd[53269]: Failed password for invalid user nobody from 212.129.138.198 port 56501 ssh2 |
2020-03-09 04:11:53 |
| 212.129.2.62 | attackbots | Jan 27 13:02:04 ms-srv sshd[29683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.2.62 Jan 27 13:02:05 ms-srv sshd[29683]: Failed password for invalid user ftptest from 212.129.2.62 port 34271 ssh2 |
2020-03-09 04:09:20 |
| 31.173.24.220 | attackspambots | Unauthorized connection attempt from IP address 31.173.24.220 on Port 445(SMB) |
2020-03-09 04:06:12 |
| 195.208.30.73 | attack | 03/08/2020-09:15:07.769015 195.208.30.73 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-09 04:41:20 |
| 116.101.230.136 | attack | Unauthorized connection attempt from IP address 116.101.230.136 on Port 445(SMB) |
2020-03-09 04:33:48 |
| 42.2.158.161 | attackbots | Honeypot attack, port: 5555, PTR: 42-2-158-161.static.netvigator.com. |
2020-03-09 04:05:46 |