City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.159.93.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.159.93.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:56:21 CST 2025
;; MSG SIZE rcvd: 106
30.93.159.130.in-addr.arpa domain name pointer sibst6-113.sibs.strath.ac.uk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.93.159.130.in-addr.arpa name = sibst6-113.sibs.strath.ac.uk.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 72.44.25.0 | attack | 03/16/2020-19:31:33.508894 72.44.25.0 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 72 |
2020-03-17 13:05:55 |
| 202.55.191.40 | attackspambots | Unauthorized connection attempt from IP address 202.55.191.40 on Port 445(SMB) |
2020-03-17 14:03:45 |
| 41.238.175.62 | attackbotsspam | 1584401468 - 03/17/2020 06:31:08 Host: host-41.238.175.62.tedata.net/41.238.175.62 Port: 23 TCP Blocked ... |
2020-03-17 13:19:59 |
| 189.16.233.194 | attackspam | Unauthorized connection attempt from IP address 189.16.233.194 on Port 445(SMB) |
2020-03-17 13:47:51 |
| 24.172.225.122 | attackspam | Automatic report - XMLRPC Attack |
2020-03-17 13:45:54 |
| 14.169.208.245 | attack | 1584401465 - 03/17/2020 00:31:05 Host: 14.169.208.245/14.169.208.245 Port: 445 TCP Blocked |
2020-03-17 13:21:55 |
| 89.91.242.140 | attackbots | Unauthorized connection attempt from IP address 89.91.242.140 on Port 445(SMB) |
2020-03-17 13:29:46 |
| 222.186.173.238 | attack | [ssh] SSH attack |
2020-03-17 13:17:10 |
| 112.85.42.195 | attackspam | Mar 17 03:56:09 santamaria sshd\[15656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195 user=root Mar 17 03:56:11 santamaria sshd\[15656\]: Failed password for root from 112.85.42.195 port 46636 ssh2 Mar 17 03:56:42 santamaria sshd\[15672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195 user=root Mar 17 03:56:44 santamaria sshd\[15672\]: Failed password for root from 112.85.42.195 port 25490 ssh2 Mar 17 03:56:47 santamaria sshd\[15672\]: Failed password for root from 112.85.42.195 port 25490 ssh2 Mar 17 03:56:49 santamaria sshd\[15672\]: Failed password for root from 112.85.42.195 port 25490 ssh2 Mar 17 03:57:52 santamaria sshd\[15683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195 user=root Mar 17 03:57:54 santamaria sshd\[15683\]: Failed password for root from 112.85.42.195 port 33182 ssh2 Mar 17 03:59:08 ... |
2020-03-17 13:15:46 |
| 222.186.175.163 | attackbotsspam | Mar 17 05:22:11 localhost sshd[88882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Mar 17 05:22:13 localhost sshd[88882]: Failed password for root from 222.186.175.163 port 9262 ssh2 Mar 17 05:22:17 localhost sshd[88882]: Failed password for root from 222.186.175.163 port 9262 ssh2 Mar 17 05:22:11 localhost sshd[88882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Mar 17 05:22:13 localhost sshd[88882]: Failed password for root from 222.186.175.163 port 9262 ssh2 Mar 17 05:22:17 localhost sshd[88882]: Failed password for root from 222.186.175.163 port 9262 ssh2 Mar 17 05:22:11 localhost sshd[88882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Mar 17 05:22:13 localhost sshd[88882]: Failed password for root from 222.186.175.163 port 9262 ssh2 Mar 17 05:22:17 localhost sshd[88882]: ... |
2020-03-17 13:25:15 |
| 51.89.40.99 | attackspam | Mar 17 10:23:30 gw1 sshd[860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.40.99 Mar 17 10:23:32 gw1 sshd[860]: Failed password for invalid user mpt from 51.89.40.99 port 38672 ssh2 ... |
2020-03-17 13:44:07 |
| 185.164.72.137 | attackspambots | Port scan on 27 port(s): 2336 3441 3882 3999 23311 24415 24435 24446 24450 25529 25545 25556 28812 28818 29918 29920 29938 29947 29956 31127 31143 31153 31159 32210 33326 34423 35546 |
2020-03-17 13:25:42 |
| 222.186.15.166 | attack | 2020-03-17T06:46:42.830368scmdmz1 sshd[16536]: Failed password for root from 222.186.15.166 port 14156 ssh2 2020-03-17T06:46:45.839738scmdmz1 sshd[16536]: Failed password for root from 222.186.15.166 port 14156 ssh2 2020-03-17T06:46:48.380106scmdmz1 sshd[16536]: Failed password for root from 222.186.15.166 port 14156 ssh2 ... |
2020-03-17 13:48:29 |
| 27.79.144.100 | attackbotsspam | Unauthorized connection attempt from IP address 27.79.144.100 on Port 445(SMB) |
2020-03-17 13:59:58 |
| 185.20.179.17 | attackbots | Automatic report - Port Scan Attack |
2020-03-17 13:56:00 |