City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.12.4.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.12.4.89. IN A
;; AUTHORITY SECTION:
. 203 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:52:44 CST 2022
;; MSG SIZE rcvd: 104
89.4.12.138.in-addr.arpa domain name pointer lxnx.com.
89.4.12.138.in-addr.arpa domain name pointer lexis-nexis.com.
89.4.12.138.in-addr.arpa domain name pointer lexstat.com.
89.4.12.138.in-addr.arpa domain name pointer search.lexisnexis.com.
89.4.12.138.in-addr.arpa domain name pointer lexsee.com.
89.4.12.138.in-addr.arpa domain name pointer search.lexis-nexis.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.4.12.138.in-addr.arpa name = lexstat.com.
89.4.12.138.in-addr.arpa name = search.lexisnexis.com.
89.4.12.138.in-addr.arpa name = lexsee.com.
89.4.12.138.in-addr.arpa name = search.lexis-nexis.com.
89.4.12.138.in-addr.arpa name = lxnx.com.
89.4.12.138.in-addr.arpa name = lexis-nexis.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 107.179.118.86 | attack | Spam |
2020-09-26 21:27:44 |
| 193.111.79.17 | attackbots | Spam Network. Infested subnet. Blocked 193.111.79.0/24 |
2020-09-26 21:26:12 |
| 160.251.8.225 | attack | Sep 26 14:10:49 ns382633 sshd\[28098\]: Invalid user princess from 160.251.8.225 port 46248 Sep 26 14:10:49 ns382633 sshd\[28098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.251.8.225 Sep 26 14:10:51 ns382633 sshd\[28098\]: Failed password for invalid user princess from 160.251.8.225 port 46248 ssh2 Sep 26 14:20:54 ns382633 sshd\[29915\]: Invalid user dan from 160.251.8.225 port 57216 Sep 26 14:20:54 ns382633 sshd\[29915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.251.8.225 |
2020-09-26 21:51:48 |
| 152.136.101.207 | attackspam | 2020-09-26T07:04:04.201211dreamphreak.com sshd[423392]: Invalid user daniel from 152.136.101.207 port 54148 2020-09-26T07:04:06.178169dreamphreak.com sshd[423392]: Failed password for invalid user daniel from 152.136.101.207 port 54148 ssh2 ... |
2020-09-26 21:35:04 |
| 1.193.39.196 | attackspam | 2020-01-18T06:23:51.410356suse-nuc sshd[27897]: Invalid user facturacion from 1.193.39.196 port 58998 ... |
2020-09-26 21:46:29 |
| 1.203.115.64 | attackbots | 2019-12-18T12:26:08.145687suse-nuc sshd[12075]: Invalid user asb from 1.203.115.64 port 42632 ... |
2020-09-26 21:20:38 |
| 1.2.207.167 | attack | 2020-02-13T23:32:21.631357suse-nuc sshd[26344]: Invalid user support from 1.2.207.167 port 59177 ... |
2020-09-26 21:34:02 |
| 164.90.181.196 | attackspambots | 164.90.181.196 - - [26/Sep/2020:11:39:14 +0100] "POST /wp-login.php HTTP/1.1" 200 2863 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 164.90.181.196 - - [26/Sep/2020:11:39:19 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 164.90.181.196 - - [26/Sep/2020:11:39:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-26 21:26:34 |
| 208.187.166.57 | attackspambots | Spam |
2020-09-26 21:24:57 |
| 148.63.189.218 | attackbots | Spam |
2020-09-26 21:26:55 |
| 1.2.157.199 | attackbots | 2020-07-05T00:46:50.444354suse-nuc sshd[19629]: Invalid user admin from 1.2.157.199 port 48517 ... |
2020-09-26 21:38:32 |
| 156.215.166.145 | attackbots | Sep 26 14:59:30 ns1 sshd[21045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.215.166.145 Sep 26 14:59:32 ns1 sshd[21045]: Failed password for invalid user admin2 from 156.215.166.145 port 51369 ssh2 |
2020-09-26 21:12:42 |
| 128.90.181.239 | attackspam | [f2b] sshd bruteforce, retries: 1 |
2020-09-26 21:33:14 |
| 5.135.161.7 | attack | "fail2ban match" |
2020-09-26 21:28:12 |
| 212.70.149.52 | attack | 2020-09-26T07:31:43.918404linuxbox-skyline auth[168493]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=photo2 rhost=212.70.149.52 ... |
2020-09-26 21:32:59 |