City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.133.116.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.133.116.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:21:02 CST 2025
;; MSG SIZE rcvd: 107
50.116.133.139.in-addr.arpa domain name pointer hhcent-games-room-mixer.abdn.ac.uk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.116.133.139.in-addr.arpa name = hhcent-games-room-mixer.abdn.ac.uk.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.165.116.22 | attack | Wordpress malicious attack:[octaxmlrpc] |
2020-07-07 16:03:22 |
| 59.127.211.87 | attackbots | Port scan on 1 port(s): 88 |
2020-07-07 15:52:57 |
| 195.136.227.90 | attackbots | $f2bV_matches |
2020-07-07 15:45:49 |
| 202.113.170.49 | attackspambots | 1594093971 - 07/07/2020 05:52:51 Host: 202.113.170.49/202.113.170.49 Port: 445 TCP Blocked |
2020-07-07 15:32:08 |
| 153.148.18.157 | attackbots |
|
2020-07-07 15:55:16 |
| 179.185.104.250 | attackbots | Jul 7 05:53:41 game-panel sshd[22242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.104.250 Jul 7 05:53:43 game-panel sshd[22242]: Failed password for invalid user andy from 179.185.104.250 port 54906 ssh2 Jul 7 05:57:40 game-panel sshd[22366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.104.250 |
2020-07-07 15:34:21 |
| 41.82.208.182 | attackbotsspam | 2020-07-07T08:27:36.574150ks3355764 sshd[30160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 user=root 2020-07-07T08:27:37.984192ks3355764 sshd[30160]: Failed password for root from 41.82.208.182 port 39172 ssh2 ... |
2020-07-07 16:05:41 |
| 51.83.33.88 | attackbotsspam | Jul 7 03:46:04 ip-172-31-62-245 sshd\[12699\]: Invalid user elastic from 51.83.33.88\ Jul 7 03:46:06 ip-172-31-62-245 sshd\[12699\]: Failed password for invalid user elastic from 51.83.33.88 port 36490 ssh2\ Jul 7 03:49:10 ip-172-31-62-245 sshd\[12732\]: Invalid user tom from 51.83.33.88\ Jul 7 03:49:12 ip-172-31-62-245 sshd\[12732\]: Failed password for invalid user tom from 51.83.33.88 port 34128 ssh2\ Jul 7 03:52:14 ip-172-31-62-245 sshd\[12753\]: Invalid user courier from 51.83.33.88\ |
2020-07-07 15:54:44 |
| 123.214.28.203 | attackspam | xmlrpc attack |
2020-07-07 15:31:11 |
| 106.75.234.54 | attackbotsspam | 2020-07-07T06:12:57.796787shield sshd\[2459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.234.54 user=root 2020-07-07T06:12:59.868988shield sshd\[2459\]: Failed password for root from 106.75.234.54 port 51870 ssh2 2020-07-07T06:13:50.393886shield sshd\[2743\]: Invalid user dy from 106.75.234.54 port 57040 2020-07-07T06:13:50.397356shield sshd\[2743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.234.54 2020-07-07T06:13:52.745492shield sshd\[2743\]: Failed password for invalid user dy from 106.75.234.54 port 57040 ssh2 |
2020-07-07 16:08:12 |
| 180.180.123.227 | attackbotsspam | $f2bV_matches |
2020-07-07 15:50:46 |
| 222.186.175.154 | attackbots | Jul 7 10:05:35 abendstille sshd\[19693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Jul 7 10:05:36 abendstille sshd\[19696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Jul 7 10:05:36 abendstille sshd\[19693\]: Failed password for root from 222.186.175.154 port 26480 ssh2 Jul 7 10:05:38 abendstille sshd\[19696\]: Failed password for root from 222.186.175.154 port 23628 ssh2 Jul 7 10:05:40 abendstille sshd\[19693\]: Failed password for root from 222.186.175.154 port 26480 ssh2 ... |
2020-07-07 16:08:37 |
| 182.74.25.246 | attack | 2020-07-07T09:54:11.846933ks3355764 sshd[32370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 user=root 2020-07-07T09:54:13.773291ks3355764 sshd[32370]: Failed password for root from 182.74.25.246 port 53764 ssh2 ... |
2020-07-07 16:01:54 |
| 174.138.41.13 | attackbots | [munged]::443 174.138.41.13 - - [07/Jul/2020:05:52:23 +0200] "POST /[munged]: HTTP/1.1" 200 8102 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 174.138.41.13 - - [07/Jul/2020:05:52:28 +0200] "POST /[munged]: HTTP/1.1" 200 8080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-07-07 15:46:24 |
| 91.121.65.15 | attackspambots | 2020-07-07T07:18:53.353850abusebot-3.cloudsearch.cf sshd[29772]: Invalid user wanghaoyu from 91.121.65.15 port 38756 2020-07-07T07:18:53.359305abusebot-3.cloudsearch.cf sshd[29772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns336411.ip-91-121-65.eu 2020-07-07T07:18:53.353850abusebot-3.cloudsearch.cf sshd[29772]: Invalid user wanghaoyu from 91.121.65.15 port 38756 2020-07-07T07:18:55.192844abusebot-3.cloudsearch.cf sshd[29772]: Failed password for invalid user wanghaoyu from 91.121.65.15 port 38756 ssh2 2020-07-07T07:21:50.185178abusebot-3.cloudsearch.cf sshd[29784]: Invalid user chen from 91.121.65.15 port 36608 2020-07-07T07:21:50.190876abusebot-3.cloudsearch.cf sshd[29784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns336411.ip-91-121-65.eu 2020-07-07T07:21:50.185178abusebot-3.cloudsearch.cf sshd[29784]: Invalid user chen from 91.121.65.15 port 36608 2020-07-07T07:21:51.988733abusebot-3.cloudse ... |
2020-07-07 15:36:20 |