City: Shanghai
Region: Shanghai
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.196.148.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.196.148.12. IN A
;; AUTHORITY SECTION:
. 81 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 08:16:39 CST 2022
;; MSG SIZE rcvd: 107
Host 12.148.196.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.148.196.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
170.210.214.50 | attackspam | Aug 15 15:12:31 lunarastro sshd[20638]: Failed password for root from 170.210.214.50 port 38706 ssh2 Aug 15 15:16:11 lunarastro sshd[20696]: Failed password for root from 170.210.214.50 port 55734 ssh2 |
2020-08-15 19:34:11 |
106.12.71.159 | attackbots | " " |
2020-08-15 19:50:25 |
58.217.249.155 | attack | [N10.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-08-15 20:02:23 |
34.94.222.56 | attackbots | Aug 15 06:12:23 serwer sshd\[1463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.94.222.56 user=root Aug 15 06:12:25 serwer sshd\[1463\]: Failed password for root from 34.94.222.56 port 35006 ssh2 Aug 15 06:17:22 serwer sshd\[5157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.94.222.56 user=root ... |
2020-08-15 19:39:57 |
183.162.79.39 | attackspambots | Too many connections or unauthorized access detected from Arctic banned ip |
2020-08-15 20:03:37 |
74.193.12.156 | attack | Aug 15 05:47:13 vps2 sshd[3042320]: Invalid user pi from 74.193.12.156 port 55388 Aug 15 05:47:20 vps2 sshd[3042342]: Invalid user pi from 74.193.12.156 port 60194 Aug 15 05:47:26 vps2 sshd[3042362]: Invalid user pi from 74.193.12.156 port 36536 Aug 15 05:47:32 vps2 sshd[3042382]: Invalid user osboxes from 74.193.12.156 port 41344 Aug 15 05:47:38 vps2 sshd[3042404]: Invalid user support from 74.193.12.156 port 46444 Aug 15 05:47:45 vps2 sshd[3042442]: Invalid user netscreen from 74.193.12.156 port 52444 Aug 15 05:47:50 vps2 sshd[3042462]: Invalid user nexthink from 74.193.12.156 port 56616 Aug 15 05:47:56 vps2 sshd[3042482]: Invalid user admin from 74.193.12.156 port 60594 Aug 15 05:48:03 vps2 sshd[3042503]: Invalid user admin from 74.193.12.156 port 37024 Aug 15 05:48:09 vps2 sshd[3042525]: Invalid user admin from 74.193.12.156 port 43278 ... |
2020-08-15 19:52:30 |
160.20.20.212 | attackbots | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-08-15 20:12:38 |
51.75.76.201 | attackspambots | 2020-08-15T00:40:00.4957571495-001 sshd[56889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.ip-51-75-76.eu user=root 2020-08-15T00:40:02.3368001495-001 sshd[56889]: Failed password for root from 51.75.76.201 port 51710 ssh2 2020-08-15T00:44:12.8636521495-001 sshd[57049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.ip-51-75-76.eu user=root 2020-08-15T00:44:14.7476301495-001 sshd[57049]: Failed password for root from 51.75.76.201 port 34034 ssh2 2020-08-15T00:48:10.0992411495-001 sshd[57200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.ip-51-75-76.eu user=root 2020-08-15T00:48:11.8748941495-001 sshd[57200]: Failed password for root from 51.75.76.201 port 44586 ssh2 ... |
2020-08-15 20:13:06 |
111.93.235.74 | attack | Aug 15 07:22:49 Host-KEWR-E sshd[15032]: Disconnected from invalid user root 111.93.235.74 port 57105 [preauth] ... |
2020-08-15 19:45:34 |
116.255.131.3 | attack | Aug 15 12:48:18 marvibiene sshd[5035]: Failed password for root from 116.255.131.3 port 45862 ssh2 |
2020-08-15 20:10:18 |
185.244.39.131 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-08-15 19:39:28 |
51.68.198.75 | attack | Aug 15 05:47:29 serwer sshd\[15551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.75 user=root Aug 15 05:47:31 serwer sshd\[15551\]: Failed password for root from 51.68.198.75 port 36648 ssh2 Aug 15 05:49:15 serwer sshd\[16817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.75 user=root ... |
2020-08-15 20:14:37 |
164.132.250.128 | attackbots | Jul 20 23:01:00 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128] Jul 20 23:01:04 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128] Jul 20 23:01:07 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128] Jul 20 23:01:11 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128] Jul 21 08:26:43 localhost postfix/smtpd[1840999]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=164.132.250.128 |
2020-08-15 19:45:18 |
190.110.35.130 | attackbotsspam | Attempted Brute Force (dovecot) |
2020-08-15 20:08:51 |
1.0.172.115 | attack | " " |
2020-08-15 19:35:02 |