City: Seabrook
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.169.102.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.169.102.192. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 08:52:28 CST 2025
;; MSG SIZE rcvd: 108
192.102.169.139.in-addr.arpa domain name pointer host.jsc.nasa.gov.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
192.102.169.139.in-addr.arpa name = host.jsc.nasa.gov.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 170.0.51.226 | attackspam | failed_logins |
2019-07-15 07:11:33 |
| 219.241.172.8 | attackspam | Automatic report - Port Scan Attack |
2019-07-15 07:28:46 |
| 177.190.145.203 | attackbotsspam | proto=tcp . spt=44989 . dpt=25 . (listed on Blocklist de Jul 14) (634) |
2019-07-15 06:48:24 |
| 190.143.39.211 | attackspambots | Jul 15 00:17:37 MK-Soft-Root1 sshd\[19391\]: Invalid user mc from 190.143.39.211 port 40380 Jul 15 00:17:37 MK-Soft-Root1 sshd\[19391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211 Jul 15 00:17:39 MK-Soft-Root1 sshd\[19391\]: Failed password for invalid user mc from 190.143.39.211 port 40380 ssh2 ... |
2019-07-15 06:51:44 |
| 5.206.230.62 | attackspam | proto=tcp . spt=45025 . dpt=25 . (listed on Blocklist de Jul 14) (617) |
2019-07-15 07:32:33 |
| 196.203.31.154 | attack | Jul 14 23:00:46 MK-Soft-VM7 sshd\[715\]: Invalid user kate from 196.203.31.154 port 54414 Jul 14 23:00:46 MK-Soft-VM7 sshd\[715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.203.31.154 Jul 14 23:00:48 MK-Soft-VM7 sshd\[715\]: Failed password for invalid user kate from 196.203.31.154 port 54414 ssh2 ... |
2019-07-15 07:10:06 |
| 60.12.172.172 | attackbotsspam | Autoban 60.12.172.172 ABORTED AUTH |
2019-07-15 07:10:31 |
| 79.27.158.74 | attackbots | Lines containing failures of 79.27.158.74 Jul 12 23:46:10 mellenthin postfix/smtpd[9482]: connect from host74-158-dynamic.27-79-r.retail.telecomhostnamealia.hostname[79.27.158.74] Jul x@x Jul 12 23:46:10 mellenthin postfix/smtpd[9482]: lost connection after DATA from host74-158-dynamic.27-79-r.retail.telecomhostnamealia.hostname[79.27.158.74] Jul 12 23:46:10 mellenthin postfix/smtpd[9482]: disconnect from host74-158-dynamic.27-79-r.retail.telecomhostnamealia.hostname[79.27.158.74] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4 Jul 14 05:18:01 mellenthin postfix/smtpd[6484]: connect from host74-158-dynamic.27-79-r.retail.telecomhostnamealia.hostname[79.27.158.74] Jul x@x Jul 14 05:18:01 mellenthin postfix/smtpd[6484]: lost connection after DATA from host74-158-dynamic.27-79-r.retail.telecomhostnamealia.hostname[79.27.158.74] Jul 14 05:18:01 mellenthin postfix/smtpd[6484]: disconnect from host74-158-dynamic.27-79-r.retail.telecomhostnamealia.hostname[79.27.158.74] ehlo=1 mai........ ------------------------------ |
2019-07-15 06:50:07 |
| 119.29.133.210 | attack | Jul 15 04:52:13 areeb-Workstation sshd\[30676\]: Invalid user melanie from 119.29.133.210 Jul 15 04:52:13 areeb-Workstation sshd\[30676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.133.210 Jul 15 04:52:15 areeb-Workstation sshd\[30676\]: Failed password for invalid user melanie from 119.29.133.210 port 54738 ssh2 ... |
2019-07-15 07:30:48 |
| 77.42.79.116 | attackspam | Automatic report - Port Scan Attack |
2019-07-15 07:16:56 |
| 65.18.115.108 | attackbots | 14.07.2019 23:14:46 - SMTP Spam without Auth on hMailserver Detected by ELinOX-hMail-A2F |
2019-07-15 07:29:23 |
| 153.36.232.36 | attackspam | Jul 15 01:05:04 ovpn sshd\[23561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.36 user=root Jul 15 01:05:06 ovpn sshd\[23561\]: Failed password for root from 153.36.232.36 port 24979 ssh2 Jul 15 01:05:14 ovpn sshd\[23581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.36 user=root Jul 15 01:05:16 ovpn sshd\[23581\]: Failed password for root from 153.36.232.36 port 57403 ssh2 Jul 15 01:05:23 ovpn sshd\[23619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.36 user=root |
2019-07-15 07:12:45 |
| 104.131.93.33 | attackspam | $f2bV_matches |
2019-07-15 07:27:53 |
| 163.172.37.194 | attackspambots | SIPVicious Scanner Detection |
2019-07-15 06:55:11 |
| 176.65.2.5 | attackbotsspam | This IP address was blacklisted for the following reason: /de/jobs/fahrer-mit-fuehrerschein-ce-m-w-d/&%27%20and%20%27x%27%3D%27x @ 2018-10-15T00:45:36+02:00. |
2019-07-15 07:16:21 |