City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.91.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.194.91.118. IN A
;; AUTHORITY SECTION:
. 409 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:38:12 CST 2022
;; MSG SIZE rcvd: 107
118.91.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-91-118.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
118.91.194.139.in-addr.arpa name = fm-dyn-139-194-91-118.fast.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
106.12.181.184 | attack | Aug 26 23:52:33 ms-srv sshd[5339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184 Aug 26 23:52:35 ms-srv sshd[5339]: Failed password for invalid user stephane from 106.12.181.184 port 47276 ssh2 |
2020-03-08 20:30:51 |
104.236.100.42 | attack | CMS (WordPress or Joomla) login attempt. |
2020-03-08 19:58:53 |
106.13.54.207 | attackspam | Dec 22 11:24:27 ms-srv sshd[51155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.207 Dec 22 11:24:30 ms-srv sshd[51155]: Failed password for invalid user test from 106.13.54.207 port 37998 ssh2 |
2020-03-08 20:08:56 |
211.38.111.211 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-03-08 20:23:51 |
79.51.194.165 | attack | Hits on port : 8080 |
2020-03-08 20:16:26 |
46.95.134.225 | attackspam | Honeypot attack, port: 139, PTR: p2E5F86E1.dip0.t-ipconnect.de. |
2020-03-08 19:53:55 |
49.234.206.45 | attack | $f2bV_matches |
2020-03-08 19:52:10 |
85.133.130.86 | attackspambots | Automatic report - Port Scan Attack |
2020-03-08 20:09:18 |
93.183.196.26 | attackspambots | Mar 8 12:12:48 pornomens sshd\[801\]: Invalid user yueyimin from 93.183.196.26 port 40730 Mar 8 12:12:48 pornomens sshd\[801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.183.196.26 Mar 8 12:12:50 pornomens sshd\[801\]: Failed password for invalid user yueyimin from 93.183.196.26 port 40730 ssh2 ... |
2020-03-08 20:04:15 |
34.87.185.57 | attackbotsspam | Mar 8 13:55:20 ncomp sshd[20472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.185.57 user=root Mar 8 13:55:21 ncomp sshd[20472]: Failed password for root from 34.87.185.57 port 55840 ssh2 Mar 8 13:55:56 ncomp sshd[20475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.185.57 user=root Mar 8 13:55:59 ncomp sshd[20475]: Failed password for root from 34.87.185.57 port 54040 ssh2 |
2020-03-08 19:59:52 |
3.1.144.197 | attackspambots | 2020-03-08T06:50:57.507301vps751288.ovh.net sshd\[23462\]: Invalid user chang from 3.1.144.197 port 34826 2020-03-08T06:50:57.514051vps751288.ovh.net sshd\[23462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-1-144-197.ap-southeast-1.compute.amazonaws.com 2020-03-08T06:50:59.673740vps751288.ovh.net sshd\[23462\]: Failed password for invalid user chang from 3.1.144.197 port 34826 ssh2 2020-03-08T06:59:25.443829vps751288.ovh.net sshd\[23488\]: Invalid user robert from 3.1.144.197 port 47238 2020-03-08T06:59:25.454242vps751288.ovh.net sshd\[23488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-1-144-197.ap-southeast-1.compute.amazonaws.com |
2020-03-08 20:08:42 |
63.81.87.174 | attackspambots | Mar 8 07:22:02 mail.srvfarm.net postfix/smtpd[3273612]: NOQUEUE: reject: RCPT from unknown[63.81.87.174]: 450 4.1.8 |
2020-03-08 20:22:32 |
27.34.47.126 | attack | Email address rejected |
2020-03-08 20:06:49 |
116.196.109.72 | attackspambots | Mar 8 10:09:00 amit sshd\[18114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.109.72 user=root Mar 8 10:09:02 amit sshd\[18114\]: Failed password for root from 116.196.109.72 port 35416 ssh2 Mar 8 10:15:52 amit sshd\[4945\]: Invalid user arul from 116.196.109.72 Mar 8 10:15:52 amit sshd\[4945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.109.72 ... |
2020-03-08 20:11:16 |
67.60.146.182 | attack | 1583642965 - 03/08/2020 05:49:25 Host: 67.60.146.182/67.60.146.182 Port: 445 TCP Blocked |
2020-03-08 20:00:56 |