City: Frankfurt am Main
Region: Hesse
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.130.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.162.130.168.		IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:06:28 CST 2022
;; MSG SIZE  rcvd: 108168.130.162.139.in-addr.arpa domain name pointer li1388-168.members.linode.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
168.130.162.139.in-addr.arpa	name = li1388-168.members.linode.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 200.48.123.101 | attackspam | reported through recidive - multiple failed attempts(SSH) | 2020-06-20 22:45:47 | 
| 46.38.150.37 | attack | 2020-06-20 15:08:51 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=tigger@csmailer.org) 2020-06-20 15:09:40 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=sql3@csmailer.org) 2020-06-20 15:10:30 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=clasic@csmailer.org) 2020-06-20 15:11:18 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=trunk@csmailer.org) 2020-06-20 15:12:08 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=operaciones@csmailer.org) ... | 2020-06-20 23:12:06 | 
| 201.77.124.248 | attackspam | Jun 20 15:15:32 electroncash sshd[47461]: Failed password for invalid user emily from 201.77.124.248 port 18786 ssh2 Jun 20 15:19:28 electroncash sshd[48490]: Invalid user sammy from 201.77.124.248 port 1880 Jun 20 15:19:28 electroncash sshd[48490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.77.124.248 Jun 20 15:19:28 electroncash sshd[48490]: Invalid user sammy from 201.77.124.248 port 1880 Jun 20 15:19:29 electroncash sshd[48490]: Failed password for invalid user sammy from 201.77.124.248 port 1880 ssh2 ... | 2020-06-20 22:54:10 | 
| 49.233.204.37 | attackbots | Jun 20 16:28:18 vpn01 sshd[20077]: Failed password for root from 49.233.204.37 port 48942 ssh2 ... | 2020-06-20 23:11:50 | 
| 175.139.202.201 | attackspam | detected by Fail2Ban | 2020-06-20 23:01:08 | 
| 92.62.131.106 | attackbots | Jun 20 14:40:49 pve1 sshd[32258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.106 Jun 20 14:40:50 pve1 sshd[32258]: Failed password for invalid user cistest from 92.62.131.106 port 60731 ssh2 ... | 2020-06-20 23:05:33 | 
| 51.91.123.119 | attack | Jun 20 19:55:47 gw1 sshd[16084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.123.119 Jun 20 19:55:49 gw1 sshd[16084]: Failed password for invalid user sebastian from 51.91.123.119 port 36374 ssh2 ... | 2020-06-20 23:08:54 | 
| 179.97.57.43 | attackbotsspam | From send-julio-1618-alkosa.com.br-8@opered.com.br Sat Jun 20 09:17:41 2020 Received: from mm57-43.opered.com.br ([179.97.57.43]:38333) | 2020-06-20 23:17:19 | 
| 106.12.148.127 | attackspambots | Jun 20 19:15:41 itv-usvr-02 sshd[4735]: Invalid user simulator from 106.12.148.127 port 42100 Jun 20 19:15:41 itv-usvr-02 sshd[4735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.127 Jun 20 19:15:41 itv-usvr-02 sshd[4735]: Invalid user simulator from 106.12.148.127 port 42100 Jun 20 19:15:43 itv-usvr-02 sshd[4735]: Failed password for invalid user simulator from 106.12.148.127 port 42100 ssh2 Jun 20 19:17:55 itv-usvr-02 sshd[4790]: Invalid user jesus from 106.12.148.127 port 42940 | 2020-06-20 23:06:25 | 
| 222.186.30.218 | attack | Jun 20 16:49:57 PorscheCustomer sshd[21993]: Failed password for root from 222.186.30.218 port 19295 ssh2 Jun 20 16:50:18 PorscheCustomer sshd[22001]: Failed password for root from 222.186.30.218 port 22356 ssh2 ... | 2020-06-20 22:55:29 | 
| 103.93.16.105 | attackspam | Jun 20 16:47:59 OPSO sshd\[16754\]: Invalid user elasticsearch from 103.93.16.105 port 51230 Jun 20 16:47:59 OPSO sshd\[16754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 Jun 20 16:48:01 OPSO sshd\[16754\]: Failed password for invalid user elasticsearch from 103.93.16.105 port 51230 ssh2 Jun 20 16:51:34 OPSO sshd\[17346\]: Invalid user carolina from 103.93.16.105 port 41172 Jun 20 16:51:34 OPSO sshd\[17346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 | 2020-06-20 22:53:53 | 
| 157.245.98.160 | attackspam | Brute force attempt | 2020-06-20 23:11:30 | 
| 165.22.33.32 | attack | Jun 20 16:29:30 [host] sshd[31760]: Invalid user e Jun 20 16:29:30 [host] sshd[31760]: pam_unix(sshd: Jun 20 16:29:32 [host] sshd[31760]: Failed passwor | 2020-06-20 22:57:41 | 
| 138.121.128.19 | attackbots | Jun 20 14:13:56 sip sshd[713615]: Failed password for invalid user cynthia from 138.121.128.19 port 56554 ssh2 Jun 20 14:17:52 sip sshd[713652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19 user=root Jun 20 14:17:54 sip sshd[713652]: Failed password for root from 138.121.128.19 port 56166 ssh2 ... | 2020-06-20 23:07:34 | 
| 185.143.72.25 | attackbotsspam | 2020-06-20T09:02:00.513886linuxbox-skyline auth[33400]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=marx rhost=185.143.72.25 ... | 2020-06-20 23:03:23 |