City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: Proximus
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.203.139.175
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.203.139.175. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031000 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 14:00:21 CST 2025
;; MSG SIZE rcvd: 108
Host 175.139.203.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 175.139.203.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
218.92.0.180 | attackspambots | SSH Brute Force, server-1 sshd[1804]: Failed password for root from 218.92.0.180 port 8326 ssh2 |
2019-12-01 06:57:45 |
41.36.136.229 | attackbotsspam | Nov 30 15:26:57 MK-Soft-Root2 sshd[2323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.36.136.229 Nov 30 15:26:59 MK-Soft-Root2 sshd[2323]: Failed password for invalid user admin from 41.36.136.229 port 45407 ssh2 ... |
2019-12-01 06:35:33 |
1.168.29.162 | attack | port scan/probe/communication attempt; port 23 |
2019-12-01 06:50:20 |
124.161.43.78 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-01 06:52:27 |
203.151.43.167 | attack | Apr 20 19:02:58 meumeu sshd[13115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.43.167 Apr 20 19:03:00 meumeu sshd[13115]: Failed password for invalid user Ilona from 203.151.43.167 port 60496 ssh2 Apr 20 19:06:50 meumeu sshd[13681]: Failed password for nx from 203.151.43.167 port 36908 ssh2 ... |
2019-12-01 06:33:08 |
168.196.179.71 | attackspam | Automatic report - Port Scan Attack |
2019-12-01 07:00:56 |
222.186.3.249 | attackbotsspam | Nov 30 23:51:58 minden010 sshd[27645]: Failed password for root from 222.186.3.249 port 51425 ssh2 Nov 30 23:52:59 minden010 sshd[27978]: Failed password for root from 222.186.3.249 port 55135 ssh2 ... |
2019-12-01 06:55:20 |
37.187.104.135 | attack | Nov 30 23:38:26 SilenceServices sshd[12987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.104.135 Nov 30 23:38:28 SilenceServices sshd[12987]: Failed password for invalid user webmaster1234567 from 37.187.104.135 port 37452 ssh2 Nov 30 23:41:58 SilenceServices sshd[17379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.104.135 |
2019-12-01 06:49:19 |
46.38.144.146 | attackbots | Nov 30 23:32:59 relay postfix/smtpd\[21833\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 23:33:17 relay postfix/smtpd\[10362\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 23:33:46 relay postfix/smtpd\[21833\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 23:34:03 relay postfix/smtpd\[9295\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 23:34:33 relay postfix/smtpd\[14945\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-01 06:36:57 |
92.63.196.3 | attack | Nov 30 22:38:15 h2177944 kernel: \[8025150.654718\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.63.196.3 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=40260 PROTO=TCP SPT=42605 DPT=1689 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 30 22:38:42 h2177944 kernel: \[8025178.084807\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.63.196.3 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=62901 PROTO=TCP SPT=42605 DPT=8389 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 30 23:08:10 h2177944 kernel: \[8026945.517780\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.63.196.3 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=41939 PROTO=TCP SPT=42605 DPT=3359 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 30 23:18:40 h2177944 kernel: \[8027575.352832\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.63.196.3 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=56692 PROTO=TCP SPT=42605 DPT=3380 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 30 23:21:07 h2177944 kernel: \[8027722.422661\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.63.196.3 DST=85.214.117.9 LEN=40 TO |
2019-12-01 06:23:20 |
125.106.27.98 | attackspambots | firewall-block, port(s): 1433/tcp |
2019-12-01 06:34:34 |
180.76.176.174 | attackbots | Nov 30 23:34:00 vps58358 sshd\[20442\]: Invalid user lommen from 180.76.176.174Nov 30 23:34:02 vps58358 sshd\[20442\]: Failed password for invalid user lommen from 180.76.176.174 port 33624 ssh2Nov 30 23:37:54 vps58358 sshd\[20462\]: Invalid user linderkamp from 180.76.176.174Nov 30 23:37:56 vps58358 sshd\[20462\]: Failed password for invalid user linderkamp from 180.76.176.174 port 37612 ssh2Nov 30 23:41:44 vps58358 sshd\[20536\]: Invalid user westby from 180.76.176.174Nov 30 23:41:47 vps58358 sshd\[20536\]: Failed password for invalid user westby from 180.76.176.174 port 41620 ssh2 ... |
2019-12-01 06:58:09 |
138.197.163.11 | attack | Nov 30 22:31:11 * sshd[10039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.163.11 Nov 30 22:31:13 * sshd[10039]: Failed password for invalid user shank from 138.197.163.11 port 60436 ssh2 |
2019-12-01 06:22:54 |
106.75.148.114 | attackbots | Nov 30 14:15:55 vtv3 sshd[5396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.114 Nov 30 14:15:57 vtv3 sshd[5396]: Failed password for invalid user operator from 106.75.148.114 port 54352 ssh2 Nov 30 14:19:36 vtv3 sshd[6695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.114 Nov 30 14:29:51 vtv3 sshd[11656]: Failed password for uucp from 106.75.148.114 port 40182 ssh2 Nov 30 14:34:04 vtv3 sshd[13733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.114 Nov 30 14:34:06 vtv3 sshd[13733]: Failed password for invalid user admin from 106.75.148.114 port 44868 ssh2 Nov 30 14:45:09 vtv3 sshd[18821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.114 Nov 30 14:45:11 vtv3 sshd[18821]: Failed password for invalid user duitama from 106.75.148.114 port 58912 ssh2 Nov 30 14:48:57 vtv3 sshd[20264]: Failed passwor |
2019-12-01 06:30:26 |
80.82.77.245 | attack | 11/30/2019-23:41:54.892917 80.82.77.245 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2019-12-01 06:53:35 |