City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.139.139.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.139.139.194. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:06:14 CST 2025
;; MSG SIZE rcvd: 108
Host 194.139.139.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 194.139.139.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
134.122.89.217 | attackspam | Error 404. The requested page (/wp-login.php) was not found |
2020-08-29 00:19:33 |
74.82.219.83 | attack | Aug 28 08:04:54 r.ca sshd[26602]: Failed password for invalid user tommy from 74.82.219.83 port 59128 ssh2 |
2020-08-29 00:11:37 |
139.162.138.232 | attack | 28.8.2020, 13:04:49 info pop3-login: Disconnected (no auth attempts in 2 secs): user=<>, rip=139.162.138.232, lip=xx.xx.xx.xx 28.8.2020, 13:04:47 info pop3-login: Disconnected (no auth attempts in 1 secs): user=<>, rip=139.162.138.232, lip=xx.xx.xx.xx |
2020-08-28 23:43:17 |
223.16.253.42 | attackbotsspam | Port scan detected on ports: 12739[TCP], 12739[TCP], 12739[TCP] |
2020-08-28 23:39:23 |
117.102.82.43 | attackspam | Aug 28 15:19:16 gospond sshd[14763]: Invalid user sammy from 117.102.82.43 port 35030 ... |
2020-08-28 23:52:12 |
157.230.125.207 | attack | 2020-08-28T07:06:00.448263morrigan.ad5gb.com sshd[2851819]: Invalid user demon from 157.230.125.207 port 41688 2020-08-28T07:06:02.443370morrigan.ad5gb.com sshd[2851819]: Failed password for invalid user demon from 157.230.125.207 port 41688 ssh2 |
2020-08-29 00:11:57 |
51.254.124.202 | attack | Aug 28 18:01:01 vps333114 sshd[14832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.ip-51-254-124.eu Aug 28 18:01:03 vps333114 sshd[14832]: Failed password for invalid user admin from 51.254.124.202 port 38618 ssh2 ... |
2020-08-29 00:06:59 |
106.12.34.97 | attack | Aug 28 14:44:30 home sshd[2047627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.97 Aug 28 14:44:30 home sshd[2047627]: Invalid user anton from 106.12.34.97 port 48294 Aug 28 14:44:32 home sshd[2047627]: Failed password for invalid user anton from 106.12.34.97 port 48294 ssh2 Aug 28 14:48:47 home sshd[2048992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.97 user=root Aug 28 14:48:50 home sshd[2048992]: Failed password for root from 106.12.34.97 port 48696 ssh2 ... |
2020-08-29 00:10:05 |
191.113.25.60 | attackbotsspam | Automatic report - Port Scan Attack |
2020-08-28 23:46:30 |
113.69.204.35 | attack | (smtpauth) Failed SMTP AUTH login from 113.69.204.35 (CN/China/-): 5 in the last 3600 secs |
2020-08-28 23:51:04 |
222.186.15.18 | attackbotsspam | Aug 28 17:37:07 OPSO sshd\[18131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18 user=root Aug 28 17:37:08 OPSO sshd\[18131\]: Failed password for root from 222.186.15.18 port 50429 ssh2 Aug 28 17:37:10 OPSO sshd\[18131\]: Failed password for root from 222.186.15.18 port 50429 ssh2 Aug 28 17:37:12 OPSO sshd\[18131\]: Failed password for root from 222.186.15.18 port 50429 ssh2 Aug 28 17:38:33 OPSO sshd\[18461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18 user=root |
2020-08-28 23:55:48 |
182.253.235.158 | attackbots | Port probing on unauthorized port 445 |
2020-08-28 23:42:57 |
189.254.255.3 | attack | Aug 28 05:40:38 dignus sshd[26382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.254.255.3 user=root Aug 28 05:40:39 dignus sshd[26382]: Failed password for root from 189.254.255.3 port 42682 ssh2 Aug 28 05:43:08 dignus sshd[26715]: Invalid user vyatta from 189.254.255.3 port 37864 Aug 28 05:43:08 dignus sshd[26715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.254.255.3 Aug 28 05:43:10 dignus sshd[26715]: Failed password for invalid user vyatta from 189.254.255.3 port 37864 ssh2 ... |
2020-08-29 00:02:13 |
218.92.0.168 | attackbotsspam | Fail2Ban Ban Triggered |
2020-08-28 23:56:17 |
222.186.173.226 | attack | Aug 28 17:59:11 sso sshd[25671]: Failed password for root from 222.186.173.226 port 46780 ssh2 Aug 28 17:59:15 sso sshd[25671]: Failed password for root from 222.186.173.226 port 46780 ssh2 ... |
2020-08-29 00:04:14 |