City: unknown
Region: unknown
Country: Cyprus
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.138.222.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.138.222.18. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 01:39:53 CST 2025
;; MSG SIZE rcvd: 107
Host 18.222.138.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 18.222.138.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 64.227.125.204 | attackbotsspam | Oct 7 11:40:56 firewall sshd[9861]: Failed password for root from 64.227.125.204 port 42246 ssh2 Oct 7 11:44:48 firewall sshd[9989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.125.204 user=root Oct 7 11:44:50 firewall sshd[9989]: Failed password for root from 64.227.125.204 port 47268 ssh2 ... |
2020-10-07 22:55:31 |
| 192.241.221.114 | attackbots | IP 192.241.221.114 attacked honeypot on port: 1080 at 10/7/2020 6:56:42 AM |
2020-10-07 23:22:32 |
| 49.234.216.204 | attack | Lines containing failures of 49.234.216.204 Oct 6 21:03:46 *** sshd[95980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.216.204 user=r.r Oct 6 21:03:48 *** sshd[95980]: Failed password for r.r from 49.234.216.204 port 42510 ssh2 Oct 6 21:03:49 *** sshd[95980]: Received disconnect from 49.234.216.204 port 42510:11: Bye Bye [preauth] Oct 6 21:03:49 *** sshd[95980]: Disconnected from authenticating user r.r 49.234.216.204 port 42510 [preauth] Oct 6 21:09:37 *** sshd[96455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.216.204 user=r.r Oct 6 21:09:40 *** sshd[96455]: Failed password for r.r from 49.234.216.204 port 43812 ssh2 Oct 6 21:09:40 *** sshd[96455]: Received disconnect from 49.234.216.204 port 43812:11: Bye Bye [preauth] Oct 6 21:09:40 *** sshd[96455]: Disconnected from authenticating user r.r 49.234.216.204 port 43812 [preauth] Oct 6 21:11:23 *** sshd[9662........ ------------------------------ |
2020-10-07 23:38:23 |
| 106.37.72.234 | attack | 2020-10-07T13:35:06.598249abusebot-2.cloudsearch.cf sshd[5041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.72.234 user=root 2020-10-07T13:35:09.107776abusebot-2.cloudsearch.cf sshd[5041]: Failed password for root from 106.37.72.234 port 38502 ssh2 2020-10-07T13:39:32.706921abusebot-2.cloudsearch.cf sshd[5067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.72.234 user=root 2020-10-07T13:39:34.398685abusebot-2.cloudsearch.cf sshd[5067]: Failed password for root from 106.37.72.234 port 47244 ssh2 2020-10-07T13:42:14.177694abusebot-2.cloudsearch.cf sshd[5088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.72.234 user=root 2020-10-07T13:42:16.110169abusebot-2.cloudsearch.cf sshd[5088]: Failed password for root from 106.37.72.234 port 41852 ssh2 2020-10-07T13:43:28.454094abusebot-2.cloudsearch.cf sshd[5094]: pam_unix(sshd:auth): authenticati ... |
2020-10-07 23:25:57 |
| 218.36.86.40 | attackspambots | SSH Brute Force |
2020-10-07 23:05:56 |
| 193.56.28.170 | attack | Port scan denied |
2020-10-07 23:30:08 |
| 191.233.195.250 | attack | Lines containing failures of 191.233.195.250 Oct 6 20:47:04 jarvis sshd[5202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.233.195.250 user=r.r Oct 6 20:47:06 jarvis sshd[5202]: Failed password for r.r from 191.233.195.250 port 56784 ssh2 Oct 6 20:47:08 jarvis sshd[5202]: Received disconnect from 191.233.195.250 port 56784:11: Bye Bye [preauth] Oct 6 20:47:08 jarvis sshd[5202]: Disconnected from authenticating user r.r 191.233.195.250 port 56784 [preauth] Oct 6 20:51:38 jarvis sshd[5562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.233.195.250 user=r.r Oct 6 20:51:40 jarvis sshd[5562]: Failed password for r.r from 191.233.195.250 port 37286 ssh2 Oct 6 20:51:40 jarvis sshd[5562]: Received disconnect from 191.233.195.250 port 37286:11: Bye Bye [preauth] Oct 6 20:51:40 jarvis sshd[5562]: Disconnected from authenticating user r.r 191.233.195.250 port 37286 [preauth] Oct ........ ------------------------------ |
2020-10-07 23:24:25 |
| 182.61.167.24 | attackbots | Oct 7 12:01:07 prox sshd[22498]: Failed password for root from 182.61.167.24 port 53926 ssh2 |
2020-10-07 22:57:39 |
| 198.199.65.166 | attackbotsspam | Oct 7 16:59:12 host1 sshd[1461533]: Failed password for root from 198.199.65.166 port 51346 ssh2 Oct 7 17:03:57 host1 sshd[1462074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.65.166 user=root Oct 7 17:03:58 host1 sshd[1462074]: Failed password for root from 198.199.65.166 port 56120 ssh2 Oct 7 17:08:26 host1 sshd[1462492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.65.166 user=root Oct 7 17:08:28 host1 sshd[1462492]: Failed password for root from 198.199.65.166 port 60892 ssh2 ... |
2020-10-07 23:21:11 |
| 121.241.244.92 | attack | Oct 7 14:10:45 scw-gallant-ride sshd[19849]: Failed password for root from 121.241.244.92 port 45663 ssh2 |
2020-10-07 23:00:31 |
| 141.98.9.163 | attackspam | Invalid user test from 141.98.9.163 port 33293 |
2020-10-07 23:33:32 |
| 125.78.160.160 | attackspambots | Lines containing failures of 125.78.160.160 Oct 5 07:43:02 neweola sshd[3035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.78.160.160 user=r.r Oct 5 07:43:04 neweola sshd[3035]: Failed password for r.r from 125.78.160.160 port 36114 ssh2 Oct 5 07:43:04 neweola sshd[3035]: Received disconnect from 125.78.160.160 port 36114:11: Bye Bye [preauth] Oct 5 07:43:04 neweola sshd[3035]: Disconnected from authenticating user r.r 125.78.160.160 port 36114 [preauth] Oct 5 07:51:38 neweola sshd[3378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.78.160.160 user=r.r Oct 5 07:51:40 neweola sshd[3378]: Failed password for r.r from 125.78.160.160 port 59518 ssh2 Oct 5 07:51:40 neweola sshd[3378]: Received disconnect from 125.78.160.160 port 59518:11: Bye Bye [preauth] Oct 5 07:51:40 neweola sshd[3378]: Disconnected from authenticating user r.r 125.78.160.160 port 59518 [preauth] Oct ........ ------------------------------ |
2020-10-07 22:59:03 |
| 197.54.246.103 | attackspam | Port probing on unauthorized port 23 |
2020-10-07 23:32:11 |
| 175.41.179.155 | attack | CMS (WordPress or Joomla) login attempt. |
2020-10-07 23:16:54 |
| 142.44.242.38 | attackbotsspam | Invalid user albert123 from 142.44.242.38 port 60018 |
2020-10-07 23:35:15 |