City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.94.54.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.94.54.52. IN A
;; AUTHORITY SECTION:
. 59 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:55:47 CST 2022
;; MSG SIZE rcvd: 105
Host 52.54.94.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 52.54.94.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
84.45.251.243 | attackbotsspam | Jul 6 01:18:40 ip-172-31-1-72 sshd\[8236\]: Invalid user freyna from 84.45.251.243 Jul 6 01:18:40 ip-172-31-1-72 sshd\[8236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.45.251.243 Jul 6 01:18:41 ip-172-31-1-72 sshd\[8236\]: Failed password for invalid user freyna from 84.45.251.243 port 59888 ssh2 Jul 6 01:23:25 ip-172-31-1-72 sshd\[8300\]: Invalid user wrapper from 84.45.251.243 Jul 6 01:23:25 ip-172-31-1-72 sshd\[8300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.45.251.243 |
2019-07-06 09:53:58 |
180.250.108.133 | attackspam | DATE:2019-07-06 01:46:44, IP:180.250.108.133, PORT:ssh brute force auth on SSH service (patata) |
2019-07-06 09:59:37 |
118.70.247.66 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:11:19,498 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.70.247.66) |
2019-07-06 10:12:42 |
125.27.56.107 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 15:59:15,714 INFO [shellcode_manager] (125.27.56.107) no match, writing hexdump (47b94d6d332b48690a815d8a69fe4d11 :2018342) - SMB (Unknown) |
2019-07-06 10:13:58 |
104.236.2.45 | attackspambots | Jul 6 02:48:12 mail sshd[11423]: Invalid user ltenti from 104.236.2.45 Jul 6 02:48:12 mail sshd[11423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.2.45 Jul 6 02:48:12 mail sshd[11423]: Invalid user ltenti from 104.236.2.45 Jul 6 02:48:14 mail sshd[11423]: Failed password for invalid user ltenti from 104.236.2.45 port 56546 ssh2 Jul 6 02:53:54 mail sshd[11999]: Invalid user idc from 104.236.2.45 ... |
2019-07-06 10:33:16 |
115.110.123.118 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 22:29:36,165 INFO [shellcode_manager] (115.110.123.118) no match, writing hexdump (1a3ad0581f51efbadf00133124225d0c :2492543) - MS17010 (EternalBlue) |
2019-07-06 10:26:50 |
169.1.176.60 | attack | 23/tcp [2019-07-05]1pkt |
2019-07-06 10:24:53 |
196.52.43.96 | attack | firewall-block, port(s): 9443/tcp |
2019-07-06 09:57:28 |
80.211.228.111 | attackspambots | Jul 5 22:42:06 work-partkepr sshd\[28009\]: Invalid user qqq from 80.211.228.111 port 51601 Jul 5 22:42:06 work-partkepr sshd\[28009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.228.111 ... |
2019-07-06 09:57:50 |
180.253.69.209 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-06 10:03:30 |
118.193.55.34 | attackbotsspam | 19/7/5@13:51:05: FAIL: Alarm-Intrusion address from=118.193.55.34 ... |
2019-07-06 10:07:59 |
37.182.190.64 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 15:58:56,477 INFO [shellcode_manager] (37.182.190.64) no match, writing hexdump (1902f87d71ef67b6a51d22b6d558c3d9 :2028332) - MS17010 (EternalBlue) |
2019-07-06 10:23:57 |
213.136.88.141 | attack | Jul 6 01:03:00 rpi sshd[14849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.88.141 Jul 6 01:03:01 rpi sshd[14849]: Failed password for invalid user pass from 213.136.88.141 port 38340 ssh2 |
2019-07-06 10:11:17 |
196.52.43.91 | attack | Brute force attack stopped by firewall |
2019-07-06 10:01:20 |
77.243.23.32 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: 77-243-23-32.dynamic.vipmobile.rs. |
2019-07-06 10:07:31 |