City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.4.172.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.4.172.152. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:36:42 CST 2025
;; MSG SIZE rcvd: 106
Host 152.172.4.129.in-addr.arpa not found: 2(SERVFAIL)
server can't find 129.4.172.152.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 95.213.176.146 | attackbots | $f2bV_matches |
2019-12-27 02:44:30 |
| 72.18.217.226 | attack | $f2bV_matches |
2019-12-27 02:47:03 |
| 103.109.218.125 | attackbotsspam | Dec 26 15:51:31 debian-2gb-nbg1-2 kernel: \[1024620.112279\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.109.218.125 DST=195.201.40.59 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=31141 DF PROTO=TCP SPT=64965 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-12-27 02:45:50 |
| 46.246.63.133 | attack | Brute-force attempt banned |
2019-12-27 02:46:35 |
| 50.63.185.234 | attackbotsspam | $f2bV_matches |
2019-12-27 02:50:06 |
| 50.63.164.78 | attackspam | $f2bV_matches |
2019-12-27 02:51:27 |
| 112.2.52.100 | attackspam | Automatic report - Banned IP Access |
2019-12-27 02:40:24 |
| 104.248.86.215 | attack | Lines containing failures of 104.248.86.215 Dec 25 02:17:48 zeta sshd[32367]: Did not receive identification string from 104.248.86.215 port 36120 Dec 25 02:18:44 zeta sshd[32376]: Received disconnect from 104.248.86.215 port 32876:11: Normal Shutdown, Thank you for playing [preauth] Dec 25 02:18:44 zeta sshd[32376]: Disconnected from authenticating user r.r 104.248.86.215 port 32876 [preauth] Dec 25 02:19:30 zeta sshd[32383]: Invalid user test from 104.248.86.215 port 36400 Dec 25 02:19:30 zeta sshd[32383]: Received disconnect from 104.248.86.215 port 36400:11: Normal Shutdown, Thank you for playing [preauth] Dec 25 02:19:30 zeta sshd[32383]: Disconnected from invalid user test 104.248.86.215 port 36400 [preauth] Dec 25 02:20:16 zeta sshd[32395]: Invalid user oracle from 104.248.86.215 port 39920 Dec 25 02:20:16 zeta sshd[32395]: Received disconnect from 104.248.86.215 port 39920:11: Normal Shutdown, Thank you for playing [preauth] Dec 25 02:20:16 zeta sshd[32395]: Disc........ ------------------------------ |
2019-12-27 03:00:14 |
| 111.230.246.199 | attackbots | $f2bV_matches |
2019-12-27 02:39:42 |
| 103.254.68.125 | attack | $f2bV_matches |
2019-12-27 02:49:43 |
| 103.84.108.234 | attack | [ 🇳🇱 ] REQUEST: /l.php |
2019-12-27 02:47:39 |
| 183.87.157.202 | attack | Dec 26 19:00:20 game-panel sshd[28390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.157.202 Dec 26 19:00:22 game-panel sshd[28390]: Failed password for invalid user itoe from 183.87.157.202 port 46036 ssh2 Dec 26 19:03:02 game-panel sshd[28526]: Failed password for root from 183.87.157.202 port 44118 ssh2 |
2019-12-27 03:09:40 |
| 139.59.41.154 | attack | Dec 26 19:39:13 h2177944 sshd\[6841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 user=root Dec 26 19:39:15 h2177944 sshd\[6841\]: Failed password for root from 139.59.41.154 port 60188 ssh2 Dec 26 19:42:57 h2177944 sshd\[7023\]: Invalid user henry from 139.59.41.154 port 36966 Dec 26 19:42:57 h2177944 sshd\[7023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 ... |
2019-12-27 02:49:10 |
| 209.85.220.41 | attackspam | This IP address is linked to major fraud and crimes of Bitcoin theft, expeditehackers@ gmail.com is ran from this IP address, so is getbackfunds@gmail.com who pose and impersonate themselves as Bitcoin theft recovery agents. They will prey on and steal from folk for a second time who have come to them looking for help with previous instances of Bitcoin theft. Both sites www.expeditetools.com and www.getbackfunds.org will also communicate through Whatsapp using two different numbers. These rotten vile grossly deceitful crooked stealing low life scum bags need locking up asap never to be released!. |
2019-12-27 03:08:53 |
| 201.161.58.8 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2019-12-27 03:11:27 |