City: Bandung
Region: Jawa Barat
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.112.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.194.112.196. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:55:17 CST 2025
;; MSG SIZE rcvd: 108
196.112.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-112-196.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
196.112.194.139.in-addr.arpa name = fm-dyn-139-194-112-196.fast.net.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.131.167.107 | attack | Aug 29 13:42:30 mail2 sshd[170300]: Invalid user svn from 104.131.167.107 port 44138 Aug 29 13:43:20 mail2 sshd[170302]: Invalid user hua from 104.131.167.107 port 49138 Aug 29 13:44:11 mail2 sshd[170304]: Invalid user superuser from 104.131.167.107 port 54138 Aug 29 13:45:01 mail2 sshd[170308]: Invalid user zam from 104.131.167.107 port 59138 Aug 29 13:45:51 mail2 sshd[170310]: Invalid user dnjenga from 104.131.167.107 port 35906 ... |
2020-08-30 01:30:07 |
| 51.91.158.178 | attack | Port scan denied |
2020-08-30 01:23:14 |
| 49.88.112.112 | attack | August 29 2020, 13:31:56 [sshd] - Banned from the Mad Pony WordPress hosting platform by Fail2ban. |
2020-08-30 01:48:07 |
| 134.122.69.58 | attackspambots | $f2bV_matches |
2020-08-30 01:53:16 |
| 112.85.42.195 | attackspambots | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-08-29T17:16:49Z |
2020-08-30 01:22:50 |
| 185.234.219.11 | attackbots | Aug 29 13:45:40 karger postfix/smtpd[23151]: warning: unknown[185.234.219.11]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 29 13:55:52 karger postfix/smtpd[26269]: warning: unknown[185.234.219.11]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 29 14:06:14 karger postfix/smtpd[29462]: warning: unknown[185.234.219.11]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-30 01:48:36 |
| 184.105.247.194 | attackbotsspam |
|
2020-08-30 01:46:19 |
| 183.81.98.183 | attackbots | Port probing on unauthorized port 23 |
2020-08-30 01:44:40 |
| 196.219.46.130 | attackspam | Icarus honeypot on github |
2020-08-30 01:43:07 |
| 180.76.167.221 | attack | Aug 29 17:17:23 ovpn sshd\[32530\]: Invalid user 22 from 180.76.167.221 Aug 29 17:17:23 ovpn sshd\[32530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.167.221 Aug 29 17:17:26 ovpn sshd\[32530\]: Failed password for invalid user 22 from 180.76.167.221 port 38970 ssh2 Aug 29 17:36:45 ovpn sshd\[5002\]: Invalid user 22 from 180.76.167.221 Aug 29 17:36:45 ovpn sshd\[5002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.167.221 |
2020-08-30 01:26:29 |
| 51.15.214.21 | attackbotsspam | Aug 29 18:22:44 dhoomketu sshd[2746650]: Invalid user testuser from 51.15.214.21 port 34270 Aug 29 18:22:44 dhoomketu sshd[2746650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.214.21 Aug 29 18:22:44 dhoomketu sshd[2746650]: Invalid user testuser from 51.15.214.21 port 34270 Aug 29 18:22:47 dhoomketu sshd[2746650]: Failed password for invalid user testuser from 51.15.214.21 port 34270 ssh2 Aug 29 18:26:18 dhoomketu sshd[2746787]: Invalid user yyk from 51.15.214.21 port 40890 ... |
2020-08-30 01:36:45 |
| 112.85.42.238 | attack | Aug 29 17:16:50 jumpserver sshd[88393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238 user=root Aug 29 17:16:51 jumpserver sshd[88393]: Failed password for root from 112.85.42.238 port 47544 ssh2 Aug 29 17:16:54 jumpserver sshd[88393]: Failed password for root from 112.85.42.238 port 47544 ssh2 ... |
2020-08-30 01:19:13 |
| 220.102.43.235 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-29T12:04:08Z and 2020-08-29T12:06:28Z |
2020-08-30 01:39:48 |
| 200.87.43.178 | attack | 1598702770 - 08/29/2020 14:06:10 Host: 200.87.43.178/200.87.43.178 Port: 445 TCP Blocked |
2020-08-30 01:52:18 |
| 188.166.20.141 | attack | 188.166.20.141 - - [29/Aug/2020:17:26:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2453 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 188.166.20.141 - - [29/Aug/2020:17:26:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2493 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 188.166.20.141 - - [29/Aug/2020:17:26:47 +0100] "POST /wp-login.php HTTP/1.1" 200 2455 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-30 01:17:25 |