City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.242.139.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;133.242.139.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:45:56 CST 2025
;; MSG SIZE rcvd: 108
145.139.242.133.in-addr.arpa domain name pointer ik1-106-59891.vs.sakura.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.139.242.133.in-addr.arpa name = ik1-106-59891.vs.sakura.ne.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
49.118.138.4 | attack | Listed on zen-spamhaus also abuseat.org / proto=6 . srcport=9879 . dstport=5555 . (2643) |
2020-09-28 02:05:45 |
93.15.41.61 | attackbots | Bruteforce detected by fail2ban |
2020-09-28 02:25:43 |
193.201.214.49 | attack |
|
2020-09-28 02:27:22 |
80.211.186.42 | attack | 2020-09-24 20:59:33 server sshd[70272]: Failed password for invalid user daniel from 80.211.186.42 port 52786 ssh2 |
2020-09-28 02:32:54 |
51.210.40.91 | attackbotsspam | Sep 27 17:48:25 localhost sshd[3671]: Invalid user admin from 51.210.40.91 port 49977 Sep 27 17:48:26 localhost sshd[3671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-3ddd41f1.vps.ovh.net Sep 27 17:48:25 localhost sshd[3671]: Invalid user admin from 51.210.40.91 port 49977 Sep 27 17:48:27 localhost sshd[3671]: Failed password for invalid user admin from 51.210.40.91 port 49977 ssh2 Sep 27 17:55:07 localhost sshd[4670]: Invalid user deploy from 51.210.40.91 port 43280 ... |
2020-09-28 02:00:31 |
46.101.173.231 | attackbots | Invalid user jackie from 46.101.173.231 port 40812 |
2020-09-28 02:20:19 |
34.87.85.162 | attackspam | invalid username '[login]' |
2020-09-28 02:26:37 |
106.12.151.250 | attack | Sep 27 19:28:34 ns382633 sshd\[29484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250 user=root Sep 27 19:28:36 ns382633 sshd\[29484\]: Failed password for root from 106.12.151.250 port 35036 ssh2 Sep 27 19:47:38 ns382633 sshd\[919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250 user=root Sep 27 19:47:39 ns382633 sshd\[919\]: Failed password for root from 106.12.151.250 port 58284 ssh2 Sep 27 19:57:11 ns382633 sshd\[2788\]: Invalid user cmsuser from 106.12.151.250 port 42660 Sep 27 19:57:11 ns382633 sshd\[2788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250 |
2020-09-28 02:09:44 |
123.252.174.205 | attackbots | 1601152517 - 09/26/2020 22:35:17 Host: 123.252.174.205/123.252.174.205 Port: 445 TCP Blocked |
2020-09-28 02:09:05 |
152.32.223.197 | attack | 152.32.223.197 (VN/Vietnam/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 27 18:15:09 server2 sshd[15401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.223.197 user=root Sep 27 18:10:19 server2 sshd[14394]: Failed password for root from 91.132.103.85 port 38216 ssh2 Sep 27 18:10:51 server2 sshd[14550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.193.164 user=root Sep 27 18:12:52 server2 sshd[14983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.245.15 user=root Sep 27 18:12:54 server2 sshd[14983]: Failed password for root from 95.111.245.15 port 37826 ssh2 IP Addresses Blocked: |
2020-09-28 02:15:55 |
122.51.91.131 | attackbotsspam | Automatic report - Banned IP Access |
2020-09-28 02:10:43 |
139.162.122.110 | attack | Sep 27 19:47:14 mout sshd[22308]: Invalid user from 139.162.122.110 port 41276 Sep 27 19:47:14 mout sshd[22308]: Invalid user from 139.162.122.110 port 41276 Sep 27 19:47:15 mout sshd[22308]: Failed none for invalid user from 139.162.122.110 port 41276 ssh2 |
2020-09-28 02:06:42 |
192.241.238.210 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 8008 resulting in total of 47 scans from 192.241.128.0/17 block. |
2020-09-28 02:10:12 |
139.198.5.79 | attackbots | Sep 27 19:04:58 ip106 sshd[28166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79 Sep 27 19:05:00 ip106 sshd[28166]: Failed password for invalid user ems from 139.198.5.79 port 46132 ssh2 ... |
2020-09-28 02:27:38 |
134.122.26.76 | attackbotsspam | Sep 27 17:38:02 gitlab sshd[1588035]: Invalid user cyrus from 134.122.26.76 port 57382 Sep 27 17:38:02 gitlab sshd[1588035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.26.76 Sep 27 17:38:02 gitlab sshd[1588035]: Invalid user cyrus from 134.122.26.76 port 57382 Sep 27 17:38:05 gitlab sshd[1588035]: Failed password for invalid user cyrus from 134.122.26.76 port 57382 ssh2 Sep 27 17:41:29 gitlab sshd[1588541]: Invalid user alvaro from 134.122.26.76 port 36520 ... |
2020-09-28 02:34:28 |