City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.19.196.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.19.196.24. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:06:29 CST 2025
;; MSG SIZE rcvd: 106
24.196.19.138.in-addr.arpa domain name pointer 138019196024.ctinets.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
24.196.19.138.in-addr.arpa name = 138019196024.ctinets.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.186.15.160 | attack | Oct 1 08:23:58 MK-Soft-VM5 sshd[14308]: Failed password for root from 222.186.15.160 port 64018 ssh2 Oct 1 08:24:01 MK-Soft-VM5 sshd[14308]: Failed password for root from 222.186.15.160 port 64018 ssh2 ... |
2019-10-01 14:28:37 |
149.56.16.168 | attackspambots | Automatic report - Banned IP Access |
2019-10-01 14:59:55 |
35.239.243.107 | attack | 35.239.243.107 - - [01/Oct/2019:05:52:23 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.239.243.107 - - [01/Oct/2019:05:52:24 +0200] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.239.243.107 - - [01/Oct/2019:05:52:25 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.239.243.107 - - [01/Oct/2019:05:52:26 +0200] "POST /wp-login.php HTTP/1.1" 200 1507 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.239.243.107 - - [01/Oct/2019:05:52:27 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.239.243.107 - - [01/Oct/2019:05:52:27 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-10-01 14:31:16 |
54.36.126.81 | attackbotsspam | Oct 1 07:10:07 tuotantolaitos sshd[6802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.126.81 Oct 1 07:10:10 tuotantolaitos sshd[6802]: Failed password for invalid user shoutcast from 54.36.126.81 port 28912 ssh2 ... |
2019-10-01 14:33:40 |
60.250.23.105 | attackspam | Invalid user rtkit from 60.250.23.105 port 37596 |
2019-10-01 15:03:14 |
149.202.65.173 | attackbots | Oct 1 08:27:44 dedicated sshd[25702]: Invalid user rosario from 149.202.65.173 port 57150 |
2019-10-01 14:40:55 |
193.70.37.140 | attack | Oct 1 06:39:17 vps647732 sshd[1919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.37.140 Oct 1 06:39:19 vps647732 sshd[1919]: Failed password for invalid user hduser from 193.70.37.140 port 45562 ssh2 ... |
2019-10-01 14:53:10 |
54.38.49.152 | attackbotsspam | Sep 29 23:01:33 wp sshd[5232]: Did not receive identification string from 54.38.49.152 Sep 29 23:03:53 wp sshd[5241]: Failed password for r.r from 54.38.49.152 port 49918 ssh2 Sep 29 23:03:53 wp sshd[5241]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth] Sep 29 23:05:35 wp sshd[5253]: Failed password for r.r from 54.38.49.152 port 59648 ssh2 Sep 29 23:05:35 wp sshd[5253]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth] Sep 29 23:07:15 wp sshd[5279]: Failed password for r.r from 54.38.49.152 port 41144 ssh2 Sep 29 23:07:15 wp sshd[5279]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth] Sep 29 23:08:53 wp sshd[5309]: Failed password for r.r from 54.38.49.152 port 50864 ssh2 Sep 29 23:08:53 wp sshd[5309]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth] Sep 29 23:10:29 wp sshd[5335]: Failed password fo........ ------------------------------- |
2019-10-01 14:56:00 |
218.25.161.189 | attack | Automatic report - Banned IP Access |
2019-10-01 15:10:12 |
192.42.116.28 | attack | Oct 1 07:06:24 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct 1 07:06:26 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct 1 07:06:28 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct 1 07:06:31 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct 1 07:06:35 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct 1 07:06:37 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2 ... |
2019-10-01 14:28:57 |
213.221.254.230 | attackbots | Sep 30 18:18:26 sachi sshd\[6462\]: Invalid user glenn from 213.221.254.230 Sep 30 18:18:26 sachi sshd\[6462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.221.254.230 Sep 30 18:18:28 sachi sshd\[6462\]: Failed password for invalid user glenn from 213.221.254.230 port 54360 ssh2 Sep 30 18:22:22 sachi sshd\[6755\]: Invalid user shane from 213.221.254.230 Sep 30 18:22:22 sachi sshd\[6755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.221.254.230 |
2019-10-01 14:59:40 |
177.92.165.205 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/177.92.165.205/ BR - 1H : (511) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN61918 IP : 177.92.165.205 CIDR : 177.92.164.0/23 PREFIX COUNT : 4 UNIQUE IP COUNT : 2048 WYKRYTE ATAKI Z ASN61918 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-01 05:52:22 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-01 14:38:10 |
37.49.227.12 | attackbots | 10/01/2019-06:56:24.204883 37.49.227.12 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-01 15:01:26 |
1.164.242.128 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.164.242.128/ TW - 1H : (223) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TW NAME ASN : ASN3462 IP : 1.164.242.128 CIDR : 1.164.0.0/16 PREFIX COUNT : 390 UNIQUE IP COUNT : 12267520 WYKRYTE ATAKI Z ASN3462 : 1H - 20 3H - 50 6H - 63 12H - 93 24H - 155 DateTime : 2019-10-01 05:51:48 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-01 15:07:02 |
62.234.131.141 | attackbotsspam | Sep 30 20:36:36 hpm sshd\[17338\]: Invalid user mfg from 62.234.131.141 Sep 30 20:36:36 hpm sshd\[17338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.131.141 Sep 30 20:36:38 hpm sshd\[17338\]: Failed password for invalid user mfg from 62.234.131.141 port 49990 ssh2 Sep 30 20:41:10 hpm sshd\[17844\]: Invalid user gesuino from 62.234.131.141 Sep 30 20:41:10 hpm sshd\[17844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.131.141 |
2019-10-01 15:04:09 |