City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.219.4.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.219.4.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 17:00:39 CST 2025
;; MSG SIZE rcvd: 105
b'Host 42.4.219.136.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 136.219.4.42.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.89.14.136 | attackbotsspam | 2020-09-04 01:16:14.806350-0500 localhost smtpd[80512]: NOQUEUE: reject: RCPT from unknown[51.89.14.136]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.89.14.136]; from= |
2020-09-04 23:19:39 |
| 59.108.66.247 | attackspambots | Invalid user yxu from 59.108.66.247 port 28347 |
2020-09-04 23:04:08 |
| 106.54.198.182 | attack | 2020-09-04T13:01:05.374997abusebot-5.cloudsearch.cf sshd[14134]: Invalid user logstash from 106.54.198.182 port 12735 2020-09-04T13:01:05.382482abusebot-5.cloudsearch.cf sshd[14134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.198.182 2020-09-04T13:01:05.374997abusebot-5.cloudsearch.cf sshd[14134]: Invalid user logstash from 106.54.198.182 port 12735 2020-09-04T13:01:06.927330abusebot-5.cloudsearch.cf sshd[14134]: Failed password for invalid user logstash from 106.54.198.182 port 12735 ssh2 2020-09-04T13:05:52.021726abusebot-5.cloudsearch.cf sshd[14151]: Invalid user andy from 106.54.198.182 port 57080 2020-09-04T13:05:52.029431abusebot-5.cloudsearch.cf sshd[14151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.198.182 2020-09-04T13:05:52.021726abusebot-5.cloudsearch.cf sshd[14151]: Invalid user andy from 106.54.198.182 port 57080 2020-09-04T13:05:54.307064abusebot-5.cloudsearch.cf sshd[ ... |
2020-09-04 23:02:17 |
| 178.128.243.225 | attackbotsspam | Sep 4 17:03:36 abendstille sshd\[26607\]: Invalid user dg from 178.128.243.225 Sep 4 17:03:36 abendstille sshd\[26607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.243.225 Sep 4 17:03:38 abendstille sshd\[26607\]: Failed password for invalid user dg from 178.128.243.225 port 44152 ssh2 Sep 4 17:10:31 abendstille sshd\[1526\]: Invalid user sistemas from 178.128.243.225 Sep 4 17:10:31 abendstille sshd\[1526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.243.225 ... |
2020-09-04 23:13:00 |
| 207.180.232.135 | attack | Fail2Ban Ban Triggered |
2020-09-04 23:06:28 |
| 200.87.210.217 | attackbots | 2020-09-03 15:17:54.648196-0500 localhost smtpd[34235]: NOQUEUE: reject: RCPT from unknown[200.87.210.217]: 554 5.7.1 Service unavailable; Client host [200.87.210.217] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/200.87.210.217; from= |
2020-09-04 23:14:45 |
| 212.70.149.20 | attack | Sep 4 17:12:44 mail postfix/smtpd\[28616\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 4 17:13:09 mail postfix/smtpd\[28233\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 4 17:13:35 mail postfix/smtpd\[28233\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 4 17:43:49 mail postfix/smtpd\[29310\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-09-04 23:43:15 |
| 139.199.10.43 | attack |
|
2020-09-04 23:42:53 |
| 114.246.9.18 | attack | Port Scan ... |
2020-09-04 23:09:47 |
| 209.97.179.52 | attackbots | Automatic report - Banned IP Access |
2020-09-04 23:34:43 |
| 195.54.160.155 | attackbots | Fail2Ban Ban Triggered |
2020-09-04 23:21:41 |
| 106.12.26.160 | attack | Sep 4 05:56:52 prod4 sshd\[24704\]: Invalid user test from 106.12.26.160 Sep 4 05:56:54 prod4 sshd\[24704\]: Failed password for invalid user test from 106.12.26.160 port 36572 ssh2 Sep 4 06:04:40 prod4 sshd\[27383\]: Failed password for root from 106.12.26.160 port 53720 ssh2 ... |
2020-09-04 23:22:31 |
| 1.38.220.54 | attackspambots | 2020-09-03 11:42:36.719026-0500 localhost smtpd[17531]: NOQUEUE: reject: RCPT from unknown[1.38.220.54]: 554 5.7.1 Service unavailable; Client host [1.38.220.54] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/1.38.220.54; from= |
2020-09-04 23:17:52 |
| 81.68.95.246 | attackspambots | leo_www |
2020-09-04 23:40:02 |
| 164.90.219.86 | attackspambots | Try to hack into router |
2020-09-04 22:59:54 |