City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.4.74.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.4.74.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 04 15:59:19 CST 2025
;; MSG SIZE rcvd: 104
b'Host 99.74.4.137.in-addr.arpa not found: 2(SERVFAIL)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.74.4.137.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
2a01:4f8:191:2093::2 | attackspambots | 20 attempts against mh-misbehave-ban on pine |
2020-06-04 02:15:22 |
20.185.224.24 | attackbotsspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-06-04 02:31:28 |
128.14.180.102 | attackbots | 1591207020 - 06/03/2020 19:57:00 Host: 128.14.180.102/128.14.180.102 Port: 161 UDP Blocked ... |
2020-06-04 02:14:32 |
187.18.108.73 | attackbots | Jun 3 14:51:22 vpn01 sshd[5242]: Failed password for root from 187.18.108.73 port 60883 ssh2 ... |
2020-06-04 02:38:18 |
187.178.162.125 | attack | Automatic report - Port Scan Attack |
2020-06-04 02:10:04 |
78.189.217.53 | attackspambots | 1591184979 - 06/03/2020 13:49:39 Host: 78.189.217.53/78.189.217.53 Port: 445 TCP Blocked |
2020-06-04 02:08:17 |
91.134.185.90 | attackbots | Automatic report - Banned IP Access |
2020-06-04 02:16:23 |
185.220.100.242 | attack | Fail2Ban Ban Triggered (2) |
2020-06-04 02:05:08 |
35.237.12.174 | attack | Automatic report - XMLRPC Attack |
2020-06-04 02:30:36 |
209.97.134.47 | attack | SSH bruteforce |
2020-06-04 02:04:14 |
106.13.228.13 | attack | Jun 3 20:49:18 itv-usvr-02 sshd[4578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.13 user=root Jun 3 20:52:51 itv-usvr-02 sshd[4682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.13 user=root Jun 3 20:56:33 itv-usvr-02 sshd[4872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.13 user=root |
2020-06-04 02:40:09 |
119.4.225.31 | attackbots | Jun 3 13:48:34 ArkNodeAT sshd\[9099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.31 user=root Jun 3 13:48:36 ArkNodeAT sshd\[9099\]: Failed password for root from 119.4.225.31 port 51413 ssh2 Jun 3 13:49:17 ArkNodeAT sshd\[9111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.31 user=root |
2020-06-04 02:20:48 |
192.99.4.63 | attack | The IP has triggered Cloudflare WAF. CF-Ray: 59d764b28f6bf059 | WAF_Rule_ID: 2e3ead4eb71148f0b1a3556e8da29348 | WAF_Kind: firewall | CF_Action: challenge | Country: CA | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ts.wevg.org | User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36 | CF_DC: EWR. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-06-04 02:43:34 |
106.13.184.139 | attackbots |
|
2020-06-04 02:35:50 |
181.49.246.20 | attack | Jun 3 13:49:44 mellenthin sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.246.20 user=root Jun 3 13:49:46 mellenthin sshd[9169]: Failed password for invalid user root from 181.49.246.20 port 56010 ssh2 |
2020-06-04 02:04:36 |