City: Greeley
Region: Colorado
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: University of Northern Colorado
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.86.34.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28239
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.86.34.129. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019042100 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 21 20:11:26 +08 2019
;; MSG SIZE rcvd: 117
Host 129.34.86.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 129.34.86.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
36.74.170.111 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-02 05:35:27 |
187.74.213.118 | attackspam | Unauthorized connection attempt from IP address 187.74.213.118 on Port 445(SMB) |
2019-11-02 05:06:12 |
134.35.149.103 | attack | 1433/tcp [2019-11-01]1pkt |
2019-11-02 05:05:02 |
185.80.55.93 | attackbotsspam | slow and persistent scanner |
2019-11-02 05:03:10 |
187.75.101.233 | attackbotsspam | 8080/tcp [2019-11-01]1pkt |
2019-11-02 05:19:35 |
36.230.145.211 | attackbotsspam | 23/tcp [2019-11-01]1pkt |
2019-11-02 05:07:37 |
104.245.144.45 | attack | (From linker.kathryn@gmail.com) Do you want to promote your advertisement on thousands of advertising sites monthly? One tiny investment every month will get you virtually unlimited traffic to your site forever! Check out our site for details: http://morebusiness.myadsubmissions.xyz |
2019-11-02 05:20:20 |
14.141.169.117 | attackbots | Unauthorized connection attempt from IP address 14.141.169.117 on Port 445(SMB) |
2019-11-02 05:09:44 |
111.231.194.149 | attack | Nov 1 21:15:30 vmanager6029 sshd\[27353\]: Invalid user sa from 111.231.194.149 port 54770 Nov 1 21:15:30 vmanager6029 sshd\[27353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.194.149 Nov 1 21:15:32 vmanager6029 sshd\[27353\]: Failed password for invalid user sa from 111.231.194.149 port 54770 ssh2 |
2019-11-02 04:59:45 |
180.148.4.180 | attack | 1433/tcp [2019-11-01]1pkt |
2019-11-02 05:29:23 |
211.151.95.139 | attack | Nov 1 21:54:06 vps666546 sshd\[11854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.151.95.139 user=root Nov 1 21:54:08 vps666546 sshd\[11854\]: Failed password for root from 211.151.95.139 port 37526 ssh2 Nov 1 21:57:36 vps666546 sshd\[11885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.151.95.139 user=root Nov 1 21:57:38 vps666546 sshd\[11885\]: Failed password for root from 211.151.95.139 port 43660 ssh2 Nov 1 22:01:08 vps666546 sshd\[11939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.151.95.139 user=root ... |
2019-11-02 05:10:04 |
185.176.27.118 | attackbotsspam | 11/01/2019-17:10:41.708624 185.176.27.118 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-02 05:11:41 |
194.36.174.15 | attack | $f2bV_matches |
2019-11-02 05:11:19 |
187.111.160.8 | attack | Brute force attempt |
2019-11-02 05:29:42 |
193.9.246.35 | attackspambots | [portscan] Port scan |
2019-11-02 05:27:00 |