City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.45.123.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;135.45.123.139. IN A
;; AUTHORITY SECTION:
. 338 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023012500 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 25 15:35:21 CST 2023
;; MSG SIZE rcvd: 107
139.123.45.135.in-addr.arpa domain name pointer nothing.attdns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.123.45.135.in-addr.arpa name = nothing.attdns.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
118.25.42.51 | attackspambots | Oct 3 11:43:15 tdfoods sshd\[32360\]: Invalid user 123E456Y from 118.25.42.51 Oct 3 11:43:15 tdfoods sshd\[32360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.42.51 Oct 3 11:43:17 tdfoods sshd\[32360\]: Failed password for invalid user 123E456Y from 118.25.42.51 port 51960 ssh2 Oct 3 11:47:46 tdfoods sshd\[32718\]: Invalid user Caramba_123 from 118.25.42.51 Oct 3 11:47:46 tdfoods sshd\[32718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.42.51 |
2019-10-04 06:01:38 |
103.66.16.18 | attackbots | Oct 3 11:07:36 eddieflores sshd\[6222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.16.18 user=root Oct 3 11:07:38 eddieflores sshd\[6222\]: Failed password for root from 103.66.16.18 port 57364 ssh2 Oct 3 11:12:30 eddieflores sshd\[6661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.16.18 user=root Oct 3 11:12:33 eddieflores sshd\[6661\]: Failed password for root from 103.66.16.18 port 43292 ssh2 Oct 3 11:17:28 eddieflores sshd\[7071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.16.18 user=root |
2019-10-04 05:49:38 |
192.227.252.17 | attackbots | Oct 3 17:47:28 plusreed sshd[783]: Invalid user msda from 192.227.252.17 ... |
2019-10-04 06:03:56 |
156.196.244.188 | attackbots | Honeypot attack, port: 445, PTR: host-156.196.188.244-static.tedata.net. |
2019-10-04 06:13:17 |
189.146.228.116 | attackbotsspam | 19/10/3@16:52:45: FAIL: Alarm-Intrusion address from=189.146.228.116 ... |
2019-10-04 05:49:18 |
45.64.139.181 | attack | Oct 2 00:08:50 mail01 postfix/postscreen[12956]: CONNECT from [45.64.139.181]:54715 to [94.130.181.95]:25 Oct 2 00:08:50 mail01 postfix/dnsblog[12957]: addr 45.64.139.181 listed by domain bl.blocklist.de as 127.0.0.9 Oct 2 00:08:50 mail01 postfix/dnsblog[12959]: addr 45.64.139.181 listed by domain zen.spamhaus.org as 127.0.0.3 Oct 2 00:08:50 mail01 postfix/dnsblog[12959]: addr 45.64.139.181 listed by domain zen.spamhaus.org as 127.0.0.11 Oct 2 00:08:50 mail01 postfix/dnsblog[12959]: addr 45.64.139.181 listed by domain zen.spamhaus.org as 127.0.0.4 Oct 2 00:08:50 mail01 postfix/dnsblog[12958]: addr 45.64.139.181 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Oct 2 00:08:50 mail01 postfix/postscreen[12956]: PREGREET 20 after 0.79 from [45.64.139.181]:54715: EHLO luserverglass.hostname Oct 2 00:08:50 mail01 postfix/postscreen[12956]: DNSBL rank 5 for [45.64.139.181]:54715 Oct x@x Oct x@x Oct 2 00:08:52 mail01 postfix/postscreen[12956]: HANGUP after 2 from [45......... ------------------------------- |
2019-10-04 06:01:19 |
203.195.235.135 | attackspam | Oct 3 11:20:50 hpm sshd\[18140\]: Invalid user ubnt from 203.195.235.135 Oct 3 11:20:50 hpm sshd\[18140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.235.135 Oct 3 11:20:52 hpm sshd\[18140\]: Failed password for invalid user ubnt from 203.195.235.135 port 44188 ssh2 Oct 3 11:24:51 hpm sshd\[18482\]: Invalid user steam from 203.195.235.135 Oct 3 11:24:51 hpm sshd\[18482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.235.135 |
2019-10-04 05:37:15 |
118.25.58.248 | attack | Oct 3 21:54:32 localhost sshd\[55839\]: Invalid user PHP@123 from 118.25.58.248 port 35314 Oct 3 21:54:32 localhost sshd\[55839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.58.248 Oct 3 21:54:34 localhost sshd\[55839\]: Failed password for invalid user PHP@123 from 118.25.58.248 port 35314 ssh2 Oct 3 21:58:55 localhost sshd\[56020\]: Invalid user P@ssw0rd from 118.25.58.248 port 54458 Oct 3 21:58:55 localhost sshd\[56020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.58.248 ... |
2019-10-04 06:02:31 |
144.135.85.184 | attackbots | Oct 3 21:45:52 game-panel sshd[15612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.135.85.184 Oct 3 21:45:54 game-panel sshd[15612]: Failed password for invalid user creis from 144.135.85.184 port 49535 ssh2 Oct 3 21:51:15 game-panel sshd[15811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.135.85.184 |
2019-10-04 05:54:45 |
185.209.0.90 | attackbots | *Port Scan* detected from 185.209.0.90 (LV/Latvia/-). 4 hits in the last 35 seconds |
2019-10-04 06:09:46 |
218.188.210.214 | attackbots | Oct 3 23:53:37 vps01 sshd[21842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.188.210.214 Oct 3 23:53:39 vps01 sshd[21842]: Failed password for invalid user mysql from 218.188.210.214 port 53002 ssh2 |
2019-10-04 05:58:19 |
222.135.210.210 | attackbotsspam | Oct 3 16:52:44 mail sshd\[32961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.135.210.210 user=root ... |
2019-10-04 05:48:10 |
185.74.4.189 | attack | Lines containing failures of 185.74.4.189 Oct 2 19:29:12 shared10 sshd[18181]: Invalid user lx from 185.74.4.189 port 41782 Oct 2 19:29:12 shared10 sshd[18181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 Oct 2 19:29:14 shared10 sshd[18181]: Failed password for invalid user lx from 185.74.4.189 port 41782 ssh2 Oct 2 19:29:14 shared10 sshd[18181]: Received disconnect from 185.74.4.189 port 41782:11: Bye Bye [preauth] Oct 2 19:29:14 shared10 sshd[18181]: Disconnected from invalid user lx 185.74.4.189 port 41782 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=185.74.4.189 |
2019-10-04 05:46:23 |
110.253.16.64 | attack | Unauthorised access (Oct 3) SRC=110.253.16.64 LEN=40 TTL=50 ID=19589 TCP DPT=8080 WINDOW=62723 SYN Unauthorised access (Oct 3) SRC=110.253.16.64 LEN=40 TTL=50 ID=3360 TCP DPT=8080 WINDOW=62723 SYN |
2019-10-04 06:12:45 |
186.183.143.171 | attackbots | Unauthorised access (Oct 3) SRC=186.183.143.171 LEN=40 TOS=0x10 PREC=0x40 TTL=51 ID=22572 TCP DPT=23 WINDOW=41953 SYN |
2019-10-04 05:44:03 |