City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.137.47.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.137.47.241. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:56:43 CST 2025
;; MSG SIZE rcvd: 107
Host 241.47.137.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 241.47.137.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
222.186.180.8 | attackspam | Nov 10 17:07:33 MainVPS sshd[9172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Nov 10 17:07:36 MainVPS sshd[9172]: Failed password for root from 222.186.180.8 port 50976 ssh2 Nov 10 17:07:48 MainVPS sshd[9172]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 50976 ssh2 [preauth] Nov 10 17:07:33 MainVPS sshd[9172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Nov 10 17:07:36 MainVPS sshd[9172]: Failed password for root from 222.186.180.8 port 50976 ssh2 Nov 10 17:07:48 MainVPS sshd[9172]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 50976 ssh2 [preauth] Nov 10 17:07:52 MainVPS sshd[9987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Nov 10 17:07:54 MainVPS sshd[9987]: Failed password for root from 222.186.180.8 port 19336 ssh2 ... |
2019-11-11 00:09:01 |
113.54.159.55 | attackbots | 2019-11-10T16:59:39.526103scmdmz1 sshd\[12645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.159.55 user=root 2019-11-10T16:59:41.571090scmdmz1 sshd\[12645\]: Failed password for root from 113.54.159.55 port 57134 ssh2 2019-11-10T17:04:34.797438scmdmz1 sshd\[13094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.159.55 user=root ... |
2019-11-11 00:07:35 |
160.16.144.12 | attack | Nov 9 06:34:53 mxgate1 postfix/postscreen[24706]: CONNECT from [160.16.144.12]:42882 to [176.31.12.44]:25 Nov 9 06:34:53 mxgate1 postfix/dnsblog[25070]: addr 160.16.144.12 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 9 06:34:54 mxgate1 postfix/dnsblog[25069]: addr 160.16.144.12 listed by domain bl.spamcop.net as 127.0.0.2 Nov 9 06:34:59 mxgate1 postfix/postscreen[25869]: DNSBL rank 2 for [160.16.144.12]:42882 Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=160.16.144.12 |
2019-11-11 00:45:02 |
5.56.135.88 | attackspam | 5.56.135.88 - - [10/Nov/2019:15:45:54 +0100] "GET /wp-login.php HTTP/1.1" 302 536 ... |
2019-11-11 00:13:15 |
189.125.2.234 | attackspam | Nov 10 06:37:41 php1 sshd\[7590\]: Invalid user carlosg from 189.125.2.234 Nov 10 06:37:41 php1 sshd\[7590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234 Nov 10 06:37:43 php1 sshd\[7590\]: Failed password for invalid user carlosg from 189.125.2.234 port 36595 ssh2 Nov 10 06:41:43 php1 sshd\[8000\]: Invalid user hmn from 189.125.2.234 Nov 10 06:41:43 php1 sshd\[8000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234 |
2019-11-11 00:44:37 |
112.94.161.141 | attack | Nov 8 00:02:27 host sshd[17073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.161.141 user=r.r Nov 8 00:02:29 host sshd[17073]: Failed password for r.r from 112.94.161.141 port 49484 ssh2 Nov 8 00:02:29 host sshd[17073]: Received disconnect from 112.94.161.141: 11: Bye Bye [preauth] Nov 8 00:17:03 host sshd[31681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.161.141 user=r.r Nov 8 00:17:06 host sshd[31681]: Failed password for r.r from 112.94.161.141 port 60558 ssh2 Nov 8 00:17:06 host sshd[31681]: Received disconnect from 112.94.161.141: 11: Bye Bye [preauth] Nov 8 00:21:13 host sshd[12097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.161.141 user=r.r Nov 8 00:21:15 host sshd[12097]: Failed password for r.r from 112.94.161.141 port 38696 ssh2 Nov 8 00:21:16 host sshd[12097]: Received disconnect from 112.94.1........ ------------------------------- |
2019-11-11 00:24:54 |
192.3.135.166 | attackspambots | Nov 10 17:22:08 markkoudstaal sshd[27531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.135.166 Nov 10 17:22:10 markkoudstaal sshd[27531]: Failed password for invalid user ireneusz from 192.3.135.166 port 52788 ssh2 Nov 10 17:26:14 markkoudstaal sshd[27858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.135.166 |
2019-11-11 00:32:19 |
172.104.94.137 | attack | 172.104.94.137 was recorded 5 times by 3 hosts attempting to connect to the following ports: 443. Incident counter (4h, 24h, all-time): 5, 5, 5 |
2019-11-11 00:31:20 |
171.221.255.5 | attackbotsspam | Brute force attempt |
2019-11-11 00:45:46 |
178.128.154.236 | attackspam | #Join The Rebellion WebMasters: deny from DigitalOcean.com |
2019-11-11 00:24:06 |
111.230.140.177 | attackbots | Nov 10 16:44:18 legacy sshd[31601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.140.177 Nov 10 16:44:20 legacy sshd[31601]: Failed password for invalid user butter from 111.230.140.177 port 56998 ssh2 Nov 10 16:49:10 legacy sshd[31743]: Failed password for root from 111.230.140.177 port 34206 ssh2 ... |
2019-11-11 00:07:07 |
125.227.236.60 | attack | Nov 10 06:38:17 php1 sshd\[14427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-236-60.hinet-ip.hinet.net user=root Nov 10 06:38:20 php1 sshd\[14427\]: Failed password for root from 125.227.236.60 port 50950 ssh2 Nov 10 06:42:24 php1 sshd\[15054\]: Invalid user cemergen from 125.227.236.60 Nov 10 06:42:24 php1 sshd\[15054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-236-60.hinet-ip.hinet.net Nov 10 06:42:26 php1 sshd\[15054\]: Failed password for invalid user cemergen from 125.227.236.60 port 59884 ssh2 |
2019-11-11 00:45:20 |
89.172.51.36 | attack | Nov 10 15:31:00 mxgate1 postfix/postscreen[20780]: CONNECT from [89.172.51.36]:13304 to [176.31.12.44]:25 Nov 10 15:31:00 mxgate1 postfix/dnsblog[20783]: addr 89.172.51.36 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 10 15:31:00 mxgate1 postfix/dnsblog[20783]: addr 89.172.51.36 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 10 15:31:00 mxgate1 postfix/dnsblog[20785]: addr 89.172.51.36 listed by domain bl.spamcop.net as 127.0.0.2 Nov 10 15:31:00 mxgate1 postfix/dnsblog[20782]: addr 89.172.51.36 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Nov 10 15:31:00 mxgate1 postfix/dnsblog[20784]: addr 89.172.51.36 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 10 15:31:00 mxgate1 postfix/dnsblog[20781]: addr 89.172.51.36 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 10 15:31:06 mxgate1 postfix/postscreen[20780]: DNSBL rank 6 for [89.172.51.36]:13304 Nov x@x Nov 10 15:31:08 mxgate1 postfix/postscreen[20780]: HANGUP after 2.4 from [89.172.51.36]:13304 in........ ------------------------------- |
2019-11-11 00:05:07 |
173.212.202.169 | attackspam | Lines containing failures of 173.212.202.169 (max 1000) Nov 9 00:57:09 Server sshd[6800]: Did not receive identification string from 173.212.202.169 port 37324 Nov 9 01:00:50 Server sshd[6805]: User r.r from 173.212.202.169 not allowed because not listed in AllowUsers Nov 9 01:00:50 Server sshd[6805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.202.169 user=r.r Nov 9 01:00:50 Server sshd[6803]: User r.r from 173.212.202.169 not allowed because not listed in AllowUsers Nov 9 01:00:50 Server sshd[6803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.202.169 user=r.r Nov 9 01:00:50 Server sshd[6814]: Invalid user jira from 173.212.202.169 port 42930 Nov 9 01:00:50 Server sshd[6809]: Invalid user test from 173.212.202.169 port 41166 Nov 9 01:00:50 Server sshd[6807]: User r.r from 173.212.202.169 not allowed because not listed in AllowUsers Nov 9 01:00:50 Server ssh........ ------------------------------ |
2019-11-11 00:29:27 |
170.130.187.14 | attackbotsspam | 170.130.187.14 was recorded 5 times by 4 hosts attempting to connect to the following ports: 1433,161,5432. Incident counter (4h, 24h, all-time): 5, 6, 44 |
2019-11-11 00:40:23 |