City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.149.33.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.149.33.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:57:27 CST 2025
;; MSG SIZE rcvd: 106
Host 39.33.149.138.in-addr.arpa not found: 2(SERVFAIL)
server can't find 138.149.33.39.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.49.110.233 | attack | Jan 14 00:05:38 ncomp sshd[20014]: Invalid user admin from 82.49.110.233 Jan 14 00:05:38 ncomp sshd[20014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.49.110.233 Jan 14 00:05:38 ncomp sshd[20014]: Invalid user admin from 82.49.110.233 Jan 14 00:05:40 ncomp sshd[20014]: Failed password for invalid user admin from 82.49.110.233 port 32836 ssh2 |
2020-01-14 08:46:10 |
| 58.213.166.140 | attack | Jan 14 01:34:44 vpn01 sshd[8645]: Failed password for root from 58.213.166.140 port 39342 ssh2 Jan 14 01:39:10 vpn01 sshd[8784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.166.140 ... |
2020-01-14 09:03:39 |
| 117.146.142.2 | attackspambots | Unauthorized connection attempt detected from IP address 117.146.142.2 to port 1433 [T] |
2020-01-14 08:47:11 |
| 118.187.6.24 | attack | Jan 14 01:37:09 vmanager6029 sshd\[17436\]: Invalid user evan from 118.187.6.24 port 33548 Jan 14 01:37:09 vmanager6029 sshd\[17436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.6.24 Jan 14 01:37:11 vmanager6029 sshd\[17436\]: Failed password for invalid user evan from 118.187.6.24 port 33548 ssh2 |
2020-01-14 08:58:04 |
| 124.101.171.139 | attackspambots | firewall-block, port(s): 23/tcp |
2020-01-14 08:43:53 |
| 60.13.172.9 | attack | Unauthorized connection attempt detected from IP address 60.13.172.9 to port 22 [T] |
2020-01-14 08:40:15 |
| 51.68.70.175 | attack | 2020-01-14T00:37:50.230230shield sshd\[28533\]: Invalid user www from 51.68.70.175 port 41006 2020-01-14T00:37:50.235968shield sshd\[28533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-51-68-70.eu 2020-01-14T00:37:52.979609shield sshd\[28533\]: Failed password for invalid user www from 51.68.70.175 port 41006 ssh2 2020-01-14T00:40:24.588914shield sshd\[28635\]: Invalid user ANGED from 51.68.70.175 port 39020 2020-01-14T00:40:24.593618shield sshd\[28635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-51-68-70.eu |
2020-01-14 08:42:03 |
| 121.43.100.67 | attackspambots | Web bot scraping website [bot:python8] |
2020-01-14 08:54:36 |
| 112.21.191.10 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.21.191.10 to port 2220 [J] |
2020-01-14 08:32:16 |
| 104.248.169.127 | attack | Jan 13 09:58:57 Tower sshd[34287]: refused connect from 177.200.34.103 (177.200.34.103) Jan 13 13:24:37 Tower sshd[34287]: refused connect from 177.200.34.103 (177.200.34.103) Jan 13 16:19:40 Tower sshd[34287]: Connection from 104.248.169.127 port 35042 on 192.168.10.220 port 22 rdomain "" Jan 13 16:19:44 Tower sshd[34287]: Invalid user admin from 104.248.169.127 port 35042 Jan 13 16:19:44 Tower sshd[34287]: error: Could not get shadow information for NOUSER Jan 13 16:19:44 Tower sshd[34287]: Failed password for invalid user admin from 104.248.169.127 port 35042 ssh2 Jan 13 16:19:44 Tower sshd[34287]: Received disconnect from 104.248.169.127 port 35042:11: Bye Bye [preauth] Jan 13 16:19:44 Tower sshd[34287]: Disconnected from invalid user admin 104.248.169.127 port 35042 [preauth] |
2020-01-14 08:58:59 |
| 178.128.150.158 | attack | 2020-01-14T00:32:16.613951shield sshd\[27893\]: Invalid user lab from 178.128.150.158 port 41700 2020-01-14T00:32:16.620344shield sshd\[27893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158 2020-01-14T00:32:18.505724shield sshd\[27893\]: Failed password for invalid user lab from 178.128.150.158 port 41700 ssh2 2020-01-14T00:34:49.607899shield sshd\[28272\]: Invalid user slview from 178.128.150.158 port 39620 2020-01-14T00:34:49.613344shield sshd\[28272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158 |
2020-01-14 08:36:12 |
| 83.25.7.201 | attackbotsspam | Malicious/Probing: /wp-login.php |
2020-01-14 08:34:34 |
| 94.255.165.127 | attackspambots | firewall-block, port(s): 5555/tcp |
2020-01-14 08:45:41 |
| 164.52.24.162 | attackspam | Unauthorized connection attempt detected from IP address 164.52.24.162 to port 443 [J] |
2020-01-14 08:38:55 |
| 158.140.95.32 | attackspam | "PROTOCOL-VOIP SIP URI bloque call header=From:any@xxxxx.com&xxxxx_IP_or_To:E.164@xxxxx.com&xxxxx_IP" |
2020-01-14 08:54:17 |