City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.168.242.176
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.168.242.176. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:39:21 CST 2025
;; MSG SIZE rcvd: 108
b'Host 176.242.168.138.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 138.168.242.176.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
197.211.51.58 | attackspam | TCP Port Scanning |
2020-07-09 03:45:20 |
190.192.40.18 | attackspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-07-09 04:19:16 |
94.102.52.57 | attackbots | [Thu May 21 12:06:10 2020] - DDoS Attack From IP: 94.102.52.57 Port: 56548 |
2020-07-09 03:53:58 |
49.235.144.143 | attackspam | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-08T19:31:41Z and 2020-07-08T20:02:57Z |
2020-07-09 04:17:54 |
46.101.206.205 | attackbots | Fail2Ban Ban Triggered |
2020-07-09 04:15:44 |
94.25.181.150 | attackspam | Brute force attempt |
2020-07-09 04:07:52 |
132.232.47.59 | attackspambots | 20818/tcp 13013/tcp 7372/tcp... [2020-06-24/07-07]9pkt,8pt.(tcp) |
2020-07-09 03:59:46 |
128.199.167.161 | attack | Jul 8 21:17:37 meumeu sshd[166083]: Invalid user jin from 128.199.167.161 port 46180 Jul 8 21:17:37 meumeu sshd[166083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.161 Jul 8 21:17:37 meumeu sshd[166083]: Invalid user jin from 128.199.167.161 port 46180 Jul 8 21:17:39 meumeu sshd[166083]: Failed password for invalid user jin from 128.199.167.161 port 46180 ssh2 Jul 8 21:20:53 meumeu sshd[166219]: Invalid user lijinfeng from 128.199.167.161 port 41474 Jul 8 21:20:53 meumeu sshd[166219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.167.161 Jul 8 21:20:53 meumeu sshd[166219]: Invalid user lijinfeng from 128.199.167.161 port 41474 Jul 8 21:20:55 meumeu sshd[166219]: Failed password for invalid user lijinfeng from 128.199.167.161 port 41474 ssh2 Jul 8 21:24:01 meumeu sshd[166393]: Invalid user liangzheming from 128.199.167.161 port 36766 ... |
2020-07-09 03:43:56 |
132.232.68.138 | attackbotsspam | Jul 8 13:44:16 nextcloud sshd\[10341\]: Invalid user vmail from 132.232.68.138 Jul 8 13:44:16 nextcloud sshd\[10341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.138 Jul 8 13:44:18 nextcloud sshd\[10341\]: Failed password for invalid user vmail from 132.232.68.138 port 56806 ssh2 |
2020-07-09 03:53:00 |
49.233.105.41 | attackspambots | Jul 8 21:50:54 server sshd[33311]: Failed password for invalid user pearl from 49.233.105.41 port 60494 ssh2 Jul 8 22:00:47 server sshd[40929]: Failed password for invalid user ripley from 49.233.105.41 port 35562 ssh2 Jul 8 22:02:54 server sshd[42657]: Failed password for invalid user tori from 49.233.105.41 port 41412 ssh2 |
2020-07-09 04:20:33 |
51.75.162.236 | attack | Repeated brute force against a port |
2020-07-09 03:54:57 |
159.203.192.134 | attack | Jul 8 22:03:03 debian-2gb-nbg1-2 kernel: \[16497180.435220\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=159.203.192.134 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=33525 PROTO=TCP SPT=52283 DPT=20367 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-09 04:12:54 |
185.143.73.134 | attackbotsspam | Jul 8 21:59:05 srv01 postfix/smtpd\[15042\]: warning: unknown\[185.143.73.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 21:59:43 srv01 postfix/smtpd\[13950\]: warning: unknown\[185.143.73.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 22:00:22 srv01 postfix/smtpd\[13950\]: warning: unknown\[185.143.73.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 22:01:01 srv01 postfix/smtpd\[16268\]: warning: unknown\[185.143.73.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 22:01:39 srv01 postfix/smtpd\[16268\]: warning: unknown\[185.143.73.134\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-09 04:04:49 |
206.189.146.27 | attackbots | Icarus honeypot on github |
2020-07-09 03:51:55 |
112.33.55.210 | attack | Jul 8 21:24:44 ns382633 sshd\[16712\]: Invalid user kim from 112.33.55.210 port 46546 Jul 8 21:24:44 ns382633 sshd\[16712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210 Jul 8 21:24:46 ns382633 sshd\[16712\]: Failed password for invalid user kim from 112.33.55.210 port 46546 ssh2 Jul 8 21:41:56 ns382633 sshd\[20227\]: Invalid user carlton from 112.33.55.210 port 51036 Jul 8 21:41:56 ns382633 sshd\[20227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210 |
2020-07-09 03:44:16 |