City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.131.16.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.131.16.100. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:02:04 CST 2025
;; MSG SIZE rcvd: 107
Host 100.16.131.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 100.16.131.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.75.16.138 | attack | 2020-06-15T16:24:29.2291541495-001 sshd[17222]: Invalid user mat from 51.75.16.138 port 47136 2020-06-15T16:24:31.0510391495-001 sshd[17222]: Failed password for invalid user mat from 51.75.16.138 port 47136 ssh2 2020-06-15T16:28:09.1684021495-001 sshd[17392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.ip-51-75-16.eu user=root 2020-06-15T16:28:11.4175621495-001 sshd[17392]: Failed password for root from 51.75.16.138 port 47501 ssh2 2020-06-15T16:31:42.9892931495-001 sshd[17546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.ip-51-75-16.eu user=root 2020-06-15T16:31:44.9191611495-001 sshd[17546]: Failed password for root from 51.75.16.138 port 47924 ssh2 ... |
2020-06-16 04:55:40 |
| 167.71.218.188 | attack | Jun 15 22:40:54 abendstille sshd\[1289\]: Invalid user testuser from 167.71.218.188 Jun 15 22:40:54 abendstille sshd\[1289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.218.188 Jun 15 22:40:56 abendstille sshd\[1289\]: Failed password for invalid user testuser from 167.71.218.188 port 38600 ssh2 Jun 15 22:44:25 abendstille sshd\[4873\]: Invalid user girish from 167.71.218.188 Jun 15 22:44:25 abendstille sshd\[4873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.218.188 ... |
2020-06-16 05:14:03 |
| 218.92.0.215 | attack | Jun 15 23:27:38 vpn01 sshd[11658]: Failed password for root from 218.92.0.215 port 28097 ssh2 Jun 15 23:27:39 vpn01 sshd[11658]: Failed password for root from 218.92.0.215 port 28097 ssh2 ... |
2020-06-16 05:29:49 |
| 37.49.224.65 | attack | SSH Brute force |
2020-06-16 05:23:39 |
| 160.177.20.162 | attack | IP 160.177.20.162 attacked honeypot on port: 1433 at 6/15/2020 9:44:10 PM |
2020-06-16 05:12:30 |
| 212.237.3.243 | attack | Jun 15 12:02:31 cumulus sshd[25763]: Invalid user arts from 212.237.3.243 port 55824 Jun 15 12:02:31 cumulus sshd[25763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.3.243 Jun 15 12:02:33 cumulus sshd[25763]: Failed password for invalid user arts from 212.237.3.243 port 55824 ssh2 Jun 15 12:02:33 cumulus sshd[25763]: Received disconnect from 212.237.3.243 port 55824:11: Bye Bye [preauth] Jun 15 12:02:33 cumulus sshd[25763]: Disconnected from 212.237.3.243 port 55824 [preauth] Jun 15 12:12:57 cumulus sshd[26921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.3.243 user=postgres Jun 15 12:12:59 cumulus sshd[26921]: Failed password for postgres from 212.237.3.243 port 44152 ssh2 Jun 15 12:12:59 cumulus sshd[26921]: Received disconnect from 212.237.3.243 port 44152:11: Bye Bye [preauth] Jun 15 12:12:59 cumulus sshd[26921]: Disconnected from 212.237.3.243 port 44152 [preaut........ ------------------------------- |
2020-06-16 05:10:29 |
| 81.192.138.161 | attackbotsspam | Jun 15 17:44:20 vps46666688 sshd[9505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.138.161 Jun 15 17:44:21 vps46666688 sshd[9505]: Failed password for invalid user bc from 81.192.138.161 port 22300 ssh2 ... |
2020-06-16 05:20:12 |
| 103.45.150.175 | attackbotsspam | Jun 15 22:41:18 OPSO sshd\[2503\]: Invalid user owa from 103.45.150.175 port 41994 Jun 15 22:41:18 OPSO sshd\[2503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.150.175 Jun 15 22:41:21 OPSO sshd\[2503\]: Failed password for invalid user owa from 103.45.150.175 port 41994 ssh2 Jun 15 22:44:38 OPSO sshd\[2888\]: Invalid user finn from 103.45.150.175 port 35058 Jun 15 22:44:38 OPSO sshd\[2888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.150.175 |
2020-06-16 05:00:09 |
| 183.134.91.53 | attackbotsspam | Jun 15 23:11:54 legacy sshd[24261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.91.53 Jun 15 23:11:56 legacy sshd[24261]: Failed password for invalid user wp-user from 183.134.91.53 port 59946 ssh2 Jun 15 23:14:16 legacy sshd[24363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.91.53 ... |
2020-06-16 05:24:07 |
| 159.89.194.160 | attackspam | Jun 15 22:44:17 |
2020-06-16 05:21:42 |
| 47.251.2.103 | attack | 15.06.2020 20:44:34 Recursive DNS scan |
2020-06-16 05:07:28 |
| 182.74.25.246 | attackspambots | Jun 15 22:50:26 haigwepa sshd[30314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 Jun 15 22:50:28 haigwepa sshd[30314]: Failed password for invalid user xsy from 182.74.25.246 port 2471 ssh2 ... |
2020-06-16 04:53:27 |
| 38.99.250.19 | attackspambots | 3 failed Login Attempts - SSH LOGIN authentication failed |
2020-06-16 05:03:51 |
| 222.186.175.23 | attackspam | Jun 15 21:09:11 localhost sshd[44194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root Jun 15 21:09:12 localhost sshd[44194]: Failed password for root from 222.186.175.23 port 46290 ssh2 Jun 15 21:09:15 localhost sshd[44194]: Failed password for root from 222.186.175.23 port 46290 ssh2 Jun 15 21:09:11 localhost sshd[44194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root Jun 15 21:09:12 localhost sshd[44194]: Failed password for root from 222.186.175.23 port 46290 ssh2 Jun 15 21:09:15 localhost sshd[44194]: Failed password for root from 222.186.175.23 port 46290 ssh2 Jun 15 21:09:11 localhost sshd[44194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root Jun 15 21:09:12 localhost sshd[44194]: Failed password for root from 222.186.175.23 port 46290 ssh2 Jun 15 21:09:15 localhost sshd[44194]: Fa ... |
2020-06-16 05:17:58 |
| 111.11.181.53 | attackbots | Jun 15 22:42:16 nas sshd[27512]: Failed password for root from 111.11.181.53 port 14995 ssh2 Jun 15 22:44:24 nas sshd[27583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.11.181.53 Jun 15 22:44:27 nas sshd[27583]: Failed password for invalid user virtual from 111.11.181.53 port 14996 ssh2 ... |
2020-06-16 05:13:36 |