City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.137.107.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.137.107.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:02:39 CST 2025
;; MSG SIZE rcvd: 107
Host 70.107.137.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 70.107.137.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.78.159.166 | attackspambots | Email rejected due to spam filtering |
2020-07-13 21:35:26 |
| 106.52.210.138 | attackbotsspam | 2020-07-13T08:00:36.6820241495-001 sshd[52233]: Invalid user user from 106.52.210.138 port 57356 2020-07-13T08:00:38.6264911495-001 sshd[52233]: Failed password for invalid user user from 106.52.210.138 port 57356 ssh2 2020-07-13T08:03:27.9885581495-001 sshd[52393]: Invalid user design from 106.52.210.138 port 60310 2020-07-13T08:03:27.9926681495-001 sshd[52393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.210.138 2020-07-13T08:03:27.9885581495-001 sshd[52393]: Invalid user design from 106.52.210.138 port 60310 2020-07-13T08:03:29.7426981495-001 sshd[52393]: Failed password for invalid user design from 106.52.210.138 port 60310 ssh2 ... |
2020-07-13 21:19:23 |
| 123.1.189.250 | attackspam | Jul 13 02:08:38 plesk sshd[5460]: Invalid user vuser from 123.1.189.250 Jul 13 02:08:38 plesk sshd[5460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.189.250 Jul 13 02:08:40 plesk sshd[5460]: Failed password for invalid user vuser from 123.1.189.250 port 48282 ssh2 Jul 13 02:08:40 plesk sshd[5460]: Received disconnect from 123.1.189.250: 11: Bye Bye [preauth] Jul 13 02:24:07 plesk sshd[6785]: Invalid user bogdan from 123.1.189.250 Jul 13 02:24:07 plesk sshd[6785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.189.250 Jul 13 02:24:09 plesk sshd[6785]: Failed password for invalid user bogdan from 123.1.189.250 port 41258 ssh2 Jul 13 02:24:09 plesk sshd[6785]: Received disconnect from 123.1.189.250: 11: Bye Bye [preauth] Jul 13 02:27:47 plesk sshd[7126]: Invalid user everdata from 123.1.189.250 Jul 13 02:27:47 plesk sshd[7126]: pam_unix(sshd:auth): authentication failure; lo........ ------------------------------- |
2020-07-13 21:29:32 |
| 172.104.109.88 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 8181 resulting in total of 8 scans from 172.104.0.0/15 block. |
2020-07-13 21:40:53 |
| 119.157.35.138 | attackbots | Email rejected due to spam filtering |
2020-07-13 21:13:01 |
| 14.202.193.117 | attackspam | 14.202.193.117 - - [13/Jul/2020:15:07:19 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.202.193.117 - - [13/Jul/2020:15:07:20 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.202.193.117 - - [13/Jul/2020:15:07:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.202.193.117 - - [13/Jul/2020:15:07:22 +0200] "POST /wp-login.php HTTP/1.1" 200 1799 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.202.193.117 - - [13/Jul/2020:15:07:22 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 14.202.193.117 - - [13/Jul/2020:15:07:24 +0200] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001 ... |
2020-07-13 21:12:20 |
| 1.235.192.218 | attackspambots | Jul 13 15:24:01 rancher-0 sshd[283071]: Invalid user seven from 1.235.192.218 port 48816 ... |
2020-07-13 21:32:12 |
| 185.143.73.148 | attackspam | Jul 13 15:44:32 srv01 postfix/smtpd\[9480\]: warning: unknown\[185.143.73.148\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 13 15:45:15 srv01 postfix/smtpd\[2998\]: warning: unknown\[185.143.73.148\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 13 15:45:59 srv01 postfix/smtpd\[7720\]: warning: unknown\[185.143.73.148\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 13 15:46:42 srv01 postfix/smtpd\[31991\]: warning: unknown\[185.143.73.148\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 13 15:47:26 srv01 postfix/smtpd\[7720\]: warning: unknown\[185.143.73.148\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-13 21:49:02 |
| 167.114.210.127 | attack | Automatic report - XMLRPC Attack |
2020-07-13 21:47:50 |
| 112.85.42.174 | attackbots | Jul 13 15:05:12 dev0-dcde-rnet sshd[31379]: Failed password for root from 112.85.42.174 port 64900 ssh2 Jul 13 15:05:25 dev0-dcde-rnet sshd[31379]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 64900 ssh2 [preauth] Jul 13 15:05:31 dev0-dcde-rnet sshd[31381]: Failed password for root from 112.85.42.174 port 37925 ssh2 |
2020-07-13 21:31:17 |
| 201.68.220.244 | attackspambots | Email rejected due to spam filtering |
2020-07-13 21:33:42 |
| 192.241.234.107 | attackbotsspam | Port scan denied |
2020-07-13 21:40:37 |
| 106.75.214.72 | attackbots | Jul 13 12:23:10 ws26vmsma01 sshd[77276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.214.72 Jul 13 12:23:12 ws26vmsma01 sshd[77276]: Failed password for invalid user webuser from 106.75.214.72 port 36464 ssh2 ... |
2020-07-13 21:45:36 |
| 179.233.3.103 | attackspam | 2020-07-13T15:23:57.251580snf-827550 sshd[31214]: Invalid user rh from 179.233.3.103 port 51747 2020-07-13T15:23:59.211424snf-827550 sshd[31214]: Failed password for invalid user rh from 179.233.3.103 port 51747 ssh2 2020-07-13T15:32:12.257390snf-827550 sshd[31937]: Invalid user helpdesk from 179.233.3.103 port 32317 ... |
2020-07-13 21:18:22 |
| 93.107.187.162 | attack | Jul 13 12:23:38 *** sshd[11047]: Invalid user utsav from 93.107.187.162 |
2020-07-13 21:14:51 |