City: Fargo
Region: North Dakota
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.129.237.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.129.237.254.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011702 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 18 11:20:58 CST 2025
;; MSG SIZE  rcvd: 108Host 254.237.129.138.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 254.237.129.138.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 186.213.47.61 | attackbotsspam | 2020-08-25T23:56:22.393015paragon sshd[269564]: Failed password for invalid user kuba from 186.213.47.61 port 43376 ssh2 2020-08-26T00:00:57.578621paragon sshd[269950]: Invalid user arq from 186.213.47.61 port 53796 2020-08-26T00:00:57.581339paragon sshd[269950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.213.47.61 2020-08-26T00:00:57.578621paragon sshd[269950]: Invalid user arq from 186.213.47.61 port 53796 2020-08-26T00:00:59.731817paragon sshd[269950]: Failed password for invalid user arq from 186.213.47.61 port 53796 ssh2 ... | 2020-08-26 04:53:30 | 
| 200.165.72.122 | attack | Unauthorized connection attempt from IP address 200.165.72.122 on Port 445(SMB) | 2020-08-26 05:11:39 | 
| 194.26.29.103 | attackspam | Port-scan: detected 258 distinct ports within a 24-hour window. | 2020-08-26 05:08:11 | 
| 219.75.134.27 | attackbotsspam | SSH | 2020-08-26 05:11:16 | 
| 70.188.81.61 | attackspam | Brute forcing RDP port 3389 | 2020-08-26 04:50:55 | 
| 222.186.15.115 | attackbots | Aug 25 22:30:09 * sshd[21083]: Failed password for root from 222.186.15.115 port 49275 ssh2 | 2020-08-26 04:40:10 | 
| 222.186.30.76 | attack | Aug 25 17:45:25 vps46666688 sshd[4090]: Failed password for root from 222.186.30.76 port 54951 ssh2 ... | 2020-08-26 04:46:50 | 
| 61.133.232.254 | attackspam | "fail2ban match" | 2020-08-26 04:43:34 | 
| 104.248.61.192 | attackbots | Aug 25 22:25:14 electroncash sshd[57030]: Invalid user fs from 104.248.61.192 port 46488 Aug 25 22:25:14 electroncash sshd[57030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.61.192 Aug 25 22:25:14 electroncash sshd[57030]: Invalid user fs from 104.248.61.192 port 46488 Aug 25 22:25:16 electroncash sshd[57030]: Failed password for invalid user fs from 104.248.61.192 port 46488 ssh2 Aug 25 22:28:36 electroncash sshd[57919]: Invalid user minecraft from 104.248.61.192 port 53650 ... | 2020-08-26 04:35:04 | 
| 196.194.205.51 | attackspam | Unauthorized connection attempt from IP address 196.194.205.51 on Port 445(SMB) | 2020-08-26 04:38:16 | 
| 177.69.89.27 | attack | Unauthorized connection attempt from IP address 177.69.89.27 on Port 445(SMB) | 2020-08-26 05:06:38 | 
| 182.61.49.179 | attack | Failed password for invalid user ts3 from 182.61.49.179 port 52622 ssh2 | 2020-08-26 04:42:40 | 
| 142.4.212.121 | attackspambots | Aug 25 21:57:57 vmd36147 sshd[9753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.212.121 Aug 25 21:57:59 vmd36147 sshd[9753]: Failed password for invalid user tgv from 142.4.212.121 port 41976 ssh2 ... | 2020-08-26 05:09:40 | 
| 85.209.0.82 | attack | Hit honeypot r. | 2020-08-26 05:05:46 | 
| 212.13.28.227 | attackbots | Unauthorized connection attempt from IP address 212.13.28.227 on Port 445(SMB) | 2020-08-26 05:07:56 |