City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.99.30.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.99.30.37. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070101 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 02 11:19:39 CST 2025
;; MSG SIZE rcvd: 104
Host 37.30.99.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 37.30.99.13.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
93.174.93.195 | attack | 93.174.93.195 was recorded 30 times by 14 hosts attempting to connect to the following ports: 51411,51412,51410. Incident counter (4h, 24h, all-time): 30, 171, 6798 |
2020-02-27 23:24:15 |
45.133.99.130 | attack | 2020-02-27 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data \(set_id=gisela.**REMOVED**@**REMOVED**.de\) 2020-02-27 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data 2020-02-27 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data |
2020-02-27 23:24:29 |
207.46.13.122 | attackspam | Automatic report - Banned IP Access |
2020-02-27 23:53:46 |
49.166.121.67 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2020-02-28 00:02:45 |
116.255.251.178 | attackbots | Port probing on unauthorized port 1500 |
2020-02-27 23:27:50 |
111.224.235.26 | attackspam | 111.224.235.26 - - \[27/Feb/2020:16:27:05 +0200\] "GET http://www.wujieliulan.com/ HTTP/1.1" 200 381 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/45.0.2454.101 Safari/537.36" |
2020-02-27 23:28:21 |
223.72.225.194 | attackbotsspam | Feb 27 15:20:37 lnxweb61 sshd[29293]: Failed password for mysql from 223.72.225.194 port 57222 ssh2 Feb 27 15:26:57 lnxweb61 sshd[2296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.72.225.194 Feb 27 15:26:59 lnxweb61 sshd[2296]: Failed password for invalid user user from 223.72.225.194 port 55002 ssh2 |
2020-02-27 23:38:26 |
183.191.31.51 | attack | 183.191.31.51 - - \[27/Feb/2020:16:27:07 +0200\] "CONNECT cn.bing.com:443 HTTP/1.1" 403 202 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3" |
2020-02-27 23:25:51 |
45.141.84.41 | attackspam | RDP Bruteforce |
2020-02-27 23:52:05 |
132.232.4.33 | attackspambots | suspicious action Thu, 27 Feb 2020 11:26:53 -0300 |
2020-02-27 23:50:43 |
195.231.3.188 | attackbots | Feb 27 14:20:00 mail postfix/smtpd\[18399\]: warning: unknown\[195.231.3.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Feb 27 15:04:05 mail postfix/smtpd\[19382\]: warning: unknown\[195.231.3.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Feb 27 15:27:37 mail postfix/smtpd\[19877\]: warning: unknown\[195.231.3.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Feb 27 15:48:20 mail postfix/smtpd\[20475\]: warning: unknown\[195.231.3.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-02-27 23:40:33 |
124.128.165.252 | attackspambots | Brute force blocker - service: proftpd1, proftpd2 - aantal: 80 - Wed Jul 11 03:50:17 2018 |
2020-02-27 23:51:03 |
171.229.213.55 | attackspambots | 23/tcp 23/tcp 23/tcp... [2020-02-11/27]4pkt,1pt.(tcp) |
2020-02-27 23:47:45 |
129.226.67.136 | attackspam | Feb 27 16:28:00 MK-Soft-VM3 sshd[31566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.136 Feb 27 16:28:01 MK-Soft-VM3 sshd[31566]: Failed password for invalid user osmc from 129.226.67.136 port 54766 ssh2 ... |
2020-02-27 23:46:53 |
80.249.145.21 | attackspambots | Feb 27 17:27:53 server sshd\[17144\]: Invalid user yangzishuang from 80.249.145.21 Feb 27 17:27:53 server sshd\[17144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gigantplat.ru Feb 27 17:27:55 server sshd\[17144\]: Failed password for invalid user yangzishuang from 80.249.145.21 port 58810 ssh2 Feb 27 17:59:16 server sshd\[22213\]: Invalid user speech-dispatcher from 80.249.145.21 Feb 27 17:59:16 server sshd\[22213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=gigantplat.ru ... |
2020-02-27 23:21:06 |