City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.116.149.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.116.149.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 20:12:26 CST 2025
;; MSG SIZE rcvd: 107
Host 38.149.116.136.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 38.149.116.136.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 186.206.144.144 | attack | 2019-11-04T05:07:41.008356suse-nuc sshd[22941]: Invalid user shclient from 186.206.144.144 port 43920 ... |
2020-01-21 07:30:48 |
| 212.129.3.201 | attackbotsspam | Triggered: repeated knocking on closed ports. |
2020-01-21 07:19:33 |
| 187.135.245.159 | attack | 2019-11-28T20:57:08.948097suse-nuc sshd[12288]: Invalid user marie from 187.135.245.159 port 41648 ... |
2020-01-21 07:05:29 |
| 129.204.108.143 | attackbots | Jan 20 22:54:57 meumeu sshd[10194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.108.143 Jan 20 22:54:59 meumeu sshd[10194]: Failed password for invalid user ruth from 129.204.108.143 port 40856 ssh2 Jan 20 22:57:49 meumeu sshd[10580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.108.143 ... |
2020-01-21 07:04:21 |
| 104.206.128.18 | attackspam | Honeypot attack, port: 81, PTR: 18-128.206.104.serverhubrdns.in-addr.arpa. |
2020-01-21 07:37:16 |
| 187.103.68.218 | attackbots | 2019-10-26T21:51:52.535658suse-nuc sshd[15892]: Invalid user ubuntu from 187.103.68.218 port 45722 ... |
2020-01-21 07:09:17 |
| 186.215.87.170 | attack | 2019-12-09T20:38:28.695443suse-nuc sshd[32229]: Invalid user bernard from 186.215.87.170 port 42467 ... |
2020-01-21 07:27:22 |
| 186.251.5.10 | attackspam | 2019-09-14T21:31:55.250397suse-nuc sshd[9454]: error: maximum authentication attempts exceeded for root from 186.251.5.10 port 36475 ssh2 [preauth] ... |
2020-01-21 07:23:33 |
| 185.186.143.118 | attackspambots | 2019-11-07T01:56:07.854094-07:00 suse-nuc sshd[582]: Bad protocol version identification 'GET / HTTP/1.1' from 185.186.143.118 port 52543 ... |
2020-01-21 07:09:34 |
| 106.54.48.29 | attack | Unauthorized connection attempt detected from IP address 106.54.48.29 to port 2220 [J] |
2020-01-21 07:36:44 |
| 186.215.130.159 | attackspam | 2020-01-11T17:15:39.092079suse-nuc sshd[5790]: Invalid user admin from 186.215.130.159 port 38853 ... |
2020-01-21 07:29:03 |
| 185.176.27.18 | attackspam | 01/20/2020-23:55:48.481786 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-21 07:04:05 |
| 186.71.57.18 | attackspambots | 2019-10-16T11:32:34.328144suse-nuc sshd[4401]: Invalid user ltdev from 186.71.57.18 port 35874 ... |
2020-01-21 07:13:45 |
| 186.179.142.189 | attackspambots | 2019-11-13T15:02:41.120116suse-nuc sshd[7052]: Invalid user admin from 186.179.142.189 port 39344 ... |
2020-01-21 07:34:43 |
| 167.99.140.14 | attackspam | 400 BAD REQUEST |
2020-01-21 07:23:08 |