City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.0.72.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.0.72.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:12:03 CST 2025
;; MSG SIZE rcvd: 104
Host 104.72.0.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.72.0.13.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 93.174.91.85 | attack | Unauthorized access or intrusion attempt detected from Thor banned IP |
2020-04-09 05:48:43 |
| 218.92.0.179 | attackbotsspam | k+ssh-bruteforce |
2020-04-09 05:31:12 |
| 92.118.211.233 | attack | Unauthorized access detected from black listed ip! |
2020-04-09 05:56:09 |
| 106.223.193.219 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 08-04-2020 13:35:14. |
2020-04-09 05:24:43 |
| 2a03:b0c0:2:d0::534:a001 | attackbots | 6001/tcp 5901/tcp 6001/tcp [2020-04-08]3pkt |
2020-04-09 05:30:22 |
| 89.222.181.58 | attack | Apr 9 00:12:01 ift sshd\[37275\]: Invalid user deploy from 89.222.181.58Apr 9 00:12:03 ift sshd\[37275\]: Failed password for invalid user deploy from 89.222.181.58 port 59348 ssh2Apr 9 00:16:09 ift sshd\[38058\]: Invalid user user from 89.222.181.58Apr 9 00:16:10 ift sshd\[38058\]: Failed password for invalid user user from 89.222.181.58 port 42876 ssh2Apr 9 00:20:10 ift sshd\[38703\]: Invalid user cssserver from 89.222.181.58 ... |
2020-04-09 05:42:40 |
| 54.38.180.93 | attackbotsspam | Apr 8 23:45:29 MainVPS sshd[31870]: Invalid user admin from 54.38.180.93 port 51104 Apr 8 23:45:29 MainVPS sshd[31870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.180.93 Apr 8 23:45:29 MainVPS sshd[31870]: Invalid user admin from 54.38.180.93 port 51104 Apr 8 23:45:31 MainVPS sshd[31870]: Failed password for invalid user admin from 54.38.180.93 port 51104 ssh2 Apr 8 23:51:05 MainVPS sshd[11167]: Invalid user tfcserver from 54.38.180.93 port 37992 ... |
2020-04-09 05:53:32 |
| 123.16.155.198 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 08-04-2020 13:35:14. |
2020-04-09 05:24:19 |
| 45.118.156.213 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 08-04-2020 13:35:15. |
2020-04-09 05:21:59 |
| 134.209.185.131 | attackbots | Apr 8 18:45:52 firewall sshd[3462]: Invalid user leonardo from 134.209.185.131 Apr 8 18:45:55 firewall sshd[3462]: Failed password for invalid user leonardo from 134.209.185.131 port 59808 ssh2 Apr 8 18:51:04 firewall sshd[3621]: Invalid user test from 134.209.185.131 ... |
2020-04-09 05:52:30 |
| 91.144.173.197 | attackbots | Apr 8 17:49:45 ws19vmsma01 sshd[104889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.144.173.197 Apr 8 17:49:47 ws19vmsma01 sshd[104889]: Failed password for invalid user ammin from 91.144.173.197 port 52934 ssh2 ... |
2020-04-09 05:28:16 |
| 223.206.43.202 | attackbots | 1586349301 - 04/08/2020 14:35:01 Host: 223.206.43.202/223.206.43.202 Port: 445 TCP Blocked |
2020-04-09 05:32:41 |
| 132.232.90.20 | attackspambots | Apr 8 21:18:56 sigma sshd\[2988\]: Invalid user teampspeak from 132.232.90.20Apr 8 21:18:57 sigma sshd\[2988\]: Failed password for invalid user teampspeak from 132.232.90.20 port 47466 ssh2 ... |
2020-04-09 05:44:17 |
| 41.42.106.147 | attackspam | 1586349286 - 04/08/2020 14:34:46 Host: 41.42.106.147/41.42.106.147 Port: 23 TCP Blocked |
2020-04-09 05:40:53 |
| 202.179.76.187 | attack | Apr 8 22:19:38 srv206 sshd[16761]: Invalid user gitolite from 202.179.76.187 ... |
2020-04-09 05:43:13 |