City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.52.210.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;131.52.210.142. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 23:05:26 CST 2025
;; MSG SIZE rcvd: 107
Host 142.210.52.131.in-addr.arpa not found: 2(SERVFAIL)
server can't find 131.52.210.142.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
154.34.24.212 | attackbotsspam | fail2ban -- 154.34.24.212 ... |
2020-08-05 20:05:18 |
70.185.113.71 | attack | Lines containing failures of 70.185.113.71 Aug 5 05:27:33 shared10 sshd[25463]: Invalid user pi from 70.185.113.71 port 38393 Aug 5 05:27:33 shared10 sshd[25465]: Invalid user pi from 70.185.113.71 port 48020 Aug 5 05:27:33 shared10 sshd[25463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.185.113.71 Aug 5 05:27:33 shared10 sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.185.113.71 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=70.185.113.71 |
2020-08-05 20:10:41 |
116.2.171.16 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-08-05 19:40:29 |
103.144.21.189 | attackbots | Aug 5 11:55:16 ns382633 sshd\[23150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.144.21.189 user=root Aug 5 11:55:18 ns382633 sshd\[23150\]: Failed password for root from 103.144.21.189 port 47766 ssh2 Aug 5 12:05:13 ns382633 sshd\[25388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.144.21.189 user=root Aug 5 12:05:14 ns382633 sshd\[25388\]: Failed password for root from 103.144.21.189 port 41836 ssh2 Aug 5 12:14:15 ns382633 sshd\[26698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.144.21.189 user=root |
2020-08-05 20:12:14 |
122.176.55.10 | attackspam | Aug 5 05:33:45 havingfunrightnow sshd[28894]: Failed password for root from 122.176.55.10 port 52541 ssh2 Aug 5 05:40:54 havingfunrightnow sshd[29122]: Failed password for root from 122.176.55.10 port 20432 ssh2 ... |
2020-08-05 20:05:33 |
49.232.86.244 | attack | Aug 5 10:31:50 minden010 sshd[8597]: Failed password for root from 49.232.86.244 port 53052 ssh2 Aug 5 10:34:17 minden010 sshd[9435]: Failed password for root from 49.232.86.244 port 45252 ssh2 ... |
2020-08-05 19:59:48 |
37.49.230.14 | attackspam | Aug 5 13:36:44 OPSO sshd\[29377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.230.14 user=root Aug 5 13:36:46 OPSO sshd\[29377\]: Failed password for root from 37.49.230.14 port 54926 ssh2 Aug 5 13:37:03 OPSO sshd\[29395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.230.14 user=root Aug 5 13:37:05 OPSO sshd\[29395\]: Failed password for root from 37.49.230.14 port 53872 ssh2 Aug 5 13:37:22 OPSO sshd\[29402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.230.14 user=root |
2020-08-05 19:39:26 |
186.58.6.48 | attackspambots | Unauthorised access (Aug 5) SRC=186.58.6.48 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=28674 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-05 19:50:42 |
106.12.182.38 | attackbots | Aug 5 08:00:45 havingfunrightnow sshd[442]: Failed password for root from 106.12.182.38 port 49186 ssh2 Aug 5 08:10:50 havingfunrightnow sshd[640]: Failed password for root from 106.12.182.38 port 49524 ssh2 ... |
2020-08-05 19:57:17 |
96.78.175.36 | attackbots | Brute-force attempt banned |
2020-08-05 20:07:00 |
51.161.45.174 | attackbots | Aug 5 12:35:44 amit sshd\[16418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.45.174 user=root Aug 5 12:35:46 amit sshd\[16418\]: Failed password for root from 51.161.45.174 port 41842 ssh2 Aug 5 12:39:28 amit sshd\[16521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.45.174 user=root ... |
2020-08-05 20:03:05 |
36.229.35.96 | attack | 20/8/4@23:46:58: FAIL: Alarm-Network address from=36.229.35.96 20/8/4@23:46:58: FAIL: Alarm-Network address from=36.229.35.96 ... |
2020-08-05 20:08:52 |
165.227.140.245 | attack | Aug 5 12:22:56 hosting sshd[11634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.140.245 user=root Aug 5 12:22:57 hosting sshd[11634]: Failed password for root from 165.227.140.245 port 57738 ssh2 ... |
2020-08-05 19:57:42 |
51.178.43.9 | attackbotsspam | 2020-08-05T13:03:32.206310+02:00 |
2020-08-05 19:54:14 |
129.211.18.180 | attackbots | Aug 5 13:55:54 abendstille sshd\[24568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.18.180 user=root Aug 5 13:55:56 abendstille sshd\[24568\]: Failed password for root from 129.211.18.180 port 11007 ssh2 Aug 5 14:00:32 abendstille sshd\[29620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.18.180 user=root Aug 5 14:00:34 abendstille sshd\[29620\]: Failed password for root from 129.211.18.180 port 58913 ssh2 Aug 5 14:05:07 abendstille sshd\[2102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.18.180 user=root ... |
2020-08-05 20:09:35 |