City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.152.83.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.152.83.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024111701 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 18 02:20:35 CST 2024
;; MSG SIZE rcvd: 107
Host 134.83.152.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.83.152.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
203.176.131.246 | attack | Oct 9 22:45:49 vpn01 sshd[26965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.176.131.246 Oct 9 22:45:51 vpn01 sshd[26965]: Failed password for invalid user AsDfGhJkL from 203.176.131.246 port 58390 ssh2 ... |
2019-10-10 05:49:27 |
139.59.7.54 | attackspambots | belitungshipwreck.org 139.59.7.54 \[09/Oct/2019:21:43:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5598 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" belitungshipwreck.org 139.59.7.54 \[09/Oct/2019:21:43:41 +0200\] "POST /wp-login.php HTTP/1.1" 200 5578 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-10 06:18:06 |
223.93.150.145 | attack | Automatic report - Port Scan Attack |
2019-10-10 06:11:23 |
178.217.173.54 | attackspambots | 2019-10-09T22:06:13.325320shield sshd\[29677\]: Invalid user Citroen2017 from 178.217.173.54 port 55348 2019-10-09T22:06:13.330454shield sshd\[29677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 2019-10-09T22:06:15.214944shield sshd\[29677\]: Failed password for invalid user Citroen2017 from 178.217.173.54 port 55348 ssh2 2019-10-09T22:11:02.978402shield sshd\[30255\]: Invalid user Fernanda_123 from 178.217.173.54 port 39062 2019-10-09T22:11:02.982975shield sshd\[30255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 |
2019-10-10 06:16:42 |
115.54.49.162 | attackbots | Unauthorised access (Oct 9) SRC=115.54.49.162 LEN=40 TTL=49 ID=4713 TCP DPT=8080 WINDOW=40734 SYN Unauthorised access (Oct 9) SRC=115.54.49.162 LEN=40 TTL=49 ID=57744 TCP DPT=8080 WINDOW=37057 SYN |
2019-10-10 06:25:16 |
137.74.159.147 | attack | Oct 9 09:34:39 hanapaa sshd\[16865\]: Invalid user Peugeot from 137.74.159.147 Oct 9 09:34:39 hanapaa sshd\[16865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sonar.terratex.eu Oct 9 09:34:40 hanapaa sshd\[16865\]: Failed password for invalid user Peugeot from 137.74.159.147 port 35996 ssh2 Oct 9 09:43:39 hanapaa sshd\[17712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sonar.terratex.eu user=root Oct 9 09:43:41 hanapaa sshd\[17712\]: Failed password for root from 137.74.159.147 port 48868 ssh2 |
2019-10-10 06:18:19 |
167.99.203.202 | attack | Oct 9 21:49:50 game-panel sshd[10854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.203.202 Oct 9 21:49:52 game-panel sshd[10854]: Failed password for invalid user Result123 from 167.99.203.202 port 45334 ssh2 Oct 9 21:53:08 game-panel sshd[11058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.203.202 |
2019-10-10 05:54:04 |
222.186.180.223 | attack | Oct 9 12:19:06 eddieflores sshd\[2751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root Oct 9 12:19:08 eddieflores sshd\[2751\]: Failed password for root from 222.186.180.223 port 19748 ssh2 Oct 9 12:19:33 eddieflores sshd\[2796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root Oct 9 12:19:35 eddieflores sshd\[2796\]: Failed password for root from 222.186.180.223 port 16816 ssh2 Oct 9 12:19:39 eddieflores sshd\[2796\]: Failed password for root from 222.186.180.223 port 16816 ssh2 |
2019-10-10 06:22:15 |
196.52.43.90 | attack | Automatic report - Port Scan Attack |
2019-10-10 05:58:16 |
5.58.119.125 | attack | Honeypot attack, port: 23, PTR: host-5-58-119-125.bitternet.ua. |
2019-10-10 05:59:45 |
169.54.190.139 | attackspam | Oct 9 23:45:38 mail kernel: [370785.345683] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=169.54.190.139 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=58 ID=19102 DF PROTO=TCP SPT=58438 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 9 23:45:38 mail kernel: [370785.518584] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=169.54.190.139 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=50 ID=26468 DF PROTO=TCP SPT=57824 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 9 23:45:39 mail kernel: [370785.912335] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=169.54.190.139 DST=77.73.69.240 LEN=40 TOS=0x08 PREC=0x20 TTL=59 ID=35631 DF PROTO=TCP SPT=54510 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 ... |
2019-10-10 05:47:47 |
171.5.248.220 | attackspam | B: Magento admin pass test (wrong country) |
2019-10-10 05:57:35 |
102.165.35.81 | attackspam | Honeypot attack, port: 389, PTR: PTR record not found |
2019-10-10 06:22:49 |
118.165.59.178 | attackbots | Honeypot attack, port: 5555, PTR: 118-165-59-178.dynamic-ip.hinet.net. |
2019-10-10 05:50:28 |
37.59.100.22 | attackspam | SSH Bruteforce attack |
2019-10-10 05:48:42 |