City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.41.225.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.41.225.142. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:52:40 CST 2025
;; MSG SIZE rcvd: 107
Host 142.225.41.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.225.41.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
212.64.57.124 | attack | Dec 24 08:44:16 odroid64 sshd\[14612\]: Invalid user ching from 212.64.57.124 Dec 24 08:44:16 odroid64 sshd\[14612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.124 ... |
2019-12-24 17:00:49 |
222.186.175.167 | attackspambots | Dec 24 04:21:56 plusreed sshd[23475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Dec 24 04:21:58 plusreed sshd[23475]: Failed password for root from 222.186.175.167 port 54620 ssh2 Dec 24 04:22:02 plusreed sshd[23475]: Failed password for root from 222.186.175.167 port 54620 ssh2 Dec 24 04:21:56 plusreed sshd[23475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Dec 24 04:21:58 plusreed sshd[23475]: Failed password for root from 222.186.175.167 port 54620 ssh2 Dec 24 04:22:02 plusreed sshd[23475]: Failed password for root from 222.186.175.167 port 54620 ssh2 ... |
2019-12-24 17:26:45 |
42.116.44.155 | attackbotsspam | Unauthorized connection attempt detected from IP address 42.116.44.155 to port 445 |
2019-12-24 17:21:09 |
122.152.219.227 | attackbots | Dec 24 05:27:51 firewall sshd[8671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.219.227 Dec 24 05:27:51 firewall sshd[8671]: Invalid user odoo from 122.152.219.227 Dec 24 05:27:53 firewall sshd[8671]: Failed password for invalid user odoo from 122.152.219.227 port 46296 ssh2 ... |
2019-12-24 16:52:31 |
106.13.145.44 | attackbots | Dec 24 08:19:15 [host] sshd[19456]: Invalid user password from 106.13.145.44 Dec 24 08:19:15 [host] sshd[19456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.145.44 Dec 24 08:19:17 [host] sshd[19456]: Failed password for invalid user password from 106.13.145.44 port 36516 ssh2 |
2019-12-24 16:55:33 |
115.186.148.38 | attackbots | <6 unauthorized SSH connections |
2019-12-24 17:05:00 |
49.88.112.61 | attack | Dec 24 10:00:57 icinga sshd[13211]: Failed password for root from 49.88.112.61 port 54112 ssh2 Dec 24 10:01:01 icinga sshd[13211]: Failed password for root from 49.88.112.61 port 54112 ssh2 Dec 24 10:01:07 icinga sshd[13211]: Failed password for root from 49.88.112.61 port 54112 ssh2 Dec 24 10:01:12 icinga sshd[13211]: Failed password for root from 49.88.112.61 port 54112 ssh2 ... |
2019-12-24 17:02:14 |
129.204.241.31 | attackspam | Dec 24 08:19:03 hell sshd[31839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.241.31 Dec 24 08:19:05 hell sshd[31839]: Failed password for invalid user lepley from 129.204.241.31 port 40950 ssh2 ... |
2019-12-24 17:03:21 |
49.150.104.157 | attackbotsspam | Unauthorized connection attempt detected from IP address 49.150.104.157 to port 445 |
2019-12-24 17:27:23 |
216.240.6.98 | attack | Honeypot attack, port: 445, PTR: dbrow3.ody.ca. |
2019-12-24 17:28:50 |
51.75.148.94 | attackspam | Dec 24 08:18:51 server postfix/smtpd[8367]: NOQUEUE: reject: RCPT from smtp.mta110.arxmail.fr[51.75.148.94]: 554 5.7.1 Service unavailable; Client host [51.75.148.94] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2019-12-24 17:20:27 |
196.61.38.138 | attack | Hits on port : 445 |
2019-12-24 17:07:08 |
128.199.132.137 | attackspambots | Hits on port : 3388 |
2019-12-24 17:09:26 |
83.12.69.226 | attackbotsspam | Telnet/23 MH Probe, BF, Hack - |
2019-12-24 17:30:06 |
196.188.114.117 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-24 17:08:02 |