City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.173.89.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.173.89.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:47:44 CST 2025
;; MSG SIZE rcvd: 107
Host 213.89.173.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 213.89.173.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 74.91.26.44 | attackspam | Sep 05 01:57:54 pop3-login: Info: Aborted login (auth failed, 1 attempts in 2 secs): user= |
2019-09-05 12:41:28 |
| 121.225.85.150 | attackspambots | Sep 5 06:08:02 saschabauer sshd[22729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.225.85.150 Sep 5 06:08:04 saschabauer sshd[22729]: Failed password for invalid user 123 from 121.225.85.150 port 19339 ssh2 |
2019-09-05 12:42:31 |
| 14.204.136.125 | attack | Sep 4 18:55:28 tdfoods sshd\[6834\]: Invalid user sammy from 14.204.136.125 Sep 4 18:55:28 tdfoods sshd\[6834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125 Sep 4 18:55:30 tdfoods sshd\[6834\]: Failed password for invalid user sammy from 14.204.136.125 port 4815 ssh2 Sep 4 19:00:56 tdfoods sshd\[7295\]: Invalid user hadoop from 14.204.136.125 Sep 4 19:00:56 tdfoods sshd\[7295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125 |
2019-09-05 13:15:06 |
| 202.101.209.186 | attack | Sep 4 12:54:45 php2 sshd\[19899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.101.209.186 user=root Sep 4 12:54:47 php2 sshd\[19899\]: Failed password for root from 202.101.209.186 port 50462 ssh2 Sep 4 12:55:56 php2 sshd\[20111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.101.209.186 user=root Sep 4 12:55:59 php2 sshd\[20111\]: Failed password for root from 202.101.209.186 port 51094 ssh2 Sep 4 12:57:57 php2 sshd\[20191\]: Invalid user pi from 202.101.209.186 |
2019-09-05 12:48:07 |
| 122.165.207.151 | attack | Sep 4 20:26:24 plusreed sshd[12467]: Invalid user vnc from 122.165.207.151 ... |
2019-09-05 12:40:36 |
| 41.74.4.114 | attackbotsspam | 2019-09-05T04:30:30.746790abusebot-2.cloudsearch.cf sshd\[16535\]: Invalid user teamspeak from 41.74.4.114 port 60376 |
2019-09-05 12:55:33 |
| 218.98.26.180 | attackbots | Sep 5 06:27:47 nginx sshd[704]: Connection from 218.98.26.180 port 60794 on 10.23.102.80 port 22 Sep 5 06:27:49 nginx sshd[704]: Received disconnect from 218.98.26.180 port 60794:11: [preauth] |
2019-09-05 12:47:36 |
| 103.16.14.171 | attackbotsspam | Automatic report - Port Scan Attack |
2019-09-05 13:17:41 |
| 58.42.199.22 | attackbots | SSH/22 MH Probe, BF, Hack - |
2019-09-05 13:22:11 |
| 92.119.160.247 | attackspambots | Unauthorised access (Sep 5) SRC=92.119.160.247 LEN=40 TTL=247 ID=18934 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Sep 3) SRC=92.119.160.247 LEN=40 TTL=247 ID=29692 TCP DPT=3389 WINDOW=1024 SYN |
2019-09-05 13:04:30 |
| 183.131.82.99 | attackbotsspam | Sep 5 07:20:14 legacy sshd[6715]: Failed password for root from 183.131.82.99 port 58588 ssh2 Sep 5 07:20:23 legacy sshd[6720]: Failed password for root from 183.131.82.99 port 15802 ssh2 ... |
2019-09-05 13:22:50 |
| 203.195.243.146 | attackspam | Sep 5 01:13:44 ny01 sshd[28569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.243.146 Sep 5 01:13:46 ny01 sshd[28569]: Failed password for invalid user minecraft from 203.195.243.146 port 40222 ssh2 Sep 5 01:19:14 ny01 sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.243.146 |
2019-09-05 13:27:43 |
| 180.182.47.132 | attackspambots | Sep 5 03:01:37 nextcloud sshd\[7827\]: Invalid user demo from 180.182.47.132 Sep 5 03:01:37 nextcloud sshd\[7827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132 Sep 5 03:01:39 nextcloud sshd\[7827\]: Failed password for invalid user demo from 180.182.47.132 port 42499 ssh2 ... |
2019-09-05 13:24:08 |
| 190.80.96.134 | attack | Lines containing failures of 190.80.96.134 Sep 5 00:19:57 ks3370873 postfix/smtpd[29623]: connect from unknown[190.80.96.134] Sep x@x Sep 5 00:19:58 ks3370873 postfix/smtpd[29623]: lost connection after DATA from unknown[190.80.96.134] Sep 5 00:19:58 ks3370873 postfix/smtpd[29623]: disconnect from unknown[190.80.96.134] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=190.80.96.134 |
2019-09-05 13:03:21 |
| 54.38.241.162 | attack | Sep 4 18:34:20 hiderm sshd\[7419\]: Invalid user testftp from 54.38.241.162 Sep 4 18:34:20 hiderm sshd\[7419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-54-38-241.eu Sep 4 18:34:22 hiderm sshd\[7419\]: Failed password for invalid user testftp from 54.38.241.162 port 58716 ssh2 Sep 4 18:42:51 hiderm sshd\[8247\]: Invalid user deploy from 54.38.241.162 Sep 4 18:42:51 hiderm sshd\[8247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-54-38-241.eu |
2019-09-05 12:51:33 |