City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.206.138.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.206.138.199. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 20:03:16 CST 2025
;; MSG SIZE rcvd: 108
Host 199.138.206.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 199.138.206.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
14.6.202.237 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/14.6.202.237/ KR - 1H : (13) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : KR NAME ASN : ASN17858 IP : 14.6.202.237 CIDR : 14.6.0.0/15 PREFIX COUNT : 40 UNIQUE IP COUNT : 9928704 ATTACKS DETECTED ASN17858 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-11-20 15:40:58 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-21 03:00:38 |
119.29.195.107 | attackspambots | IP blocked |
2019-11-21 02:46:29 |
197.45.155.12 | attack | 2019-11-20T16:30:11.899260ns386461 sshd\[21816\]: Invalid user admin from 197.45.155.12 port 36961 2019-11-20T16:30:11.904190ns386461 sshd\[21816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12 2019-11-20T16:30:13.386595ns386461 sshd\[21816\]: Failed password for invalid user admin from 197.45.155.12 port 36961 ssh2 2019-11-20T16:41:24.260223ns386461 sshd\[31642\]: Invalid user kanssas from 197.45.155.12 port 18037 2019-11-20T16:41:24.265227ns386461 sshd\[31642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12 ... |
2019-11-21 02:46:53 |
132.232.93.48 | attackspam | Unauthorized SSH login attempts |
2019-11-21 02:31:49 |
61.148.52.82 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-21 02:48:29 |
223.243.29.102 | attack | Nov 20 14:36:11 game-panel sshd[1873]: Failed password for root from 223.243.29.102 port 44362 ssh2 Nov 20 14:42:14 game-panel sshd[2176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.243.29.102 Nov 20 14:42:16 game-panel sshd[2176]: Failed password for invalid user jisu0306 from 223.243.29.102 port 50512 ssh2 |
2019-11-21 02:25:12 |
34.215.242.168 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-21 02:58:46 |
109.15.173.92 | attack | 109.15.173.92 was recorded 5 times by 1 hosts attempting to connect to the following ports: 23,2323. Incident counter (4h, 24h, all-time): 5, 5, 5 |
2019-11-21 02:48:09 |
89.205.8.237 | attack | Nov 20 17:50:22 vpn01 sshd[19839]: Failed password for root from 89.205.8.237 port 33674 ssh2 ... |
2019-11-21 02:30:22 |
41.207.182.133 | attackbotsspam | Nov 20 08:04:00 sachi sshd\[11647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.182.133 user=root Nov 20 08:04:02 sachi sshd\[11647\]: Failed password for root from 41.207.182.133 port 36750 ssh2 Nov 20 08:07:59 sachi sshd\[11951\]: Invalid user disney from 41.207.182.133 Nov 20 08:07:59 sachi sshd\[11951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.182.133 Nov 20 08:08:01 sachi sshd\[11951\]: Failed password for invalid user disney from 41.207.182.133 port 44974 ssh2 |
2019-11-21 02:38:45 |
123.206.51.192 | attackspam | 2019-11-20T18:23:55.106092stark.klein-stark.info sshd\[17761\]: Invalid user saeec from 123.206.51.192 port 36156 2019-11-20T18:23:55.111148stark.klein-stark.info sshd\[17761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192 2019-11-20T18:23:56.743557stark.klein-stark.info sshd\[17761\]: Failed password for invalid user saeec from 123.206.51.192 port 36156 ssh2 ... |
2019-11-21 02:34:56 |
106.12.214.128 | attackspambots | Nov 20 11:49:12 Tower sshd[28021]: Connection from 106.12.214.128 port 43649 on 192.168.10.220 port 22 Nov 20 11:49:16 Tower sshd[28021]: Invalid user fricke from 106.12.214.128 port 43649 Nov 20 11:49:16 Tower sshd[28021]: error: Could not get shadow information for NOUSER Nov 20 11:49:16 Tower sshd[28021]: Failed password for invalid user fricke from 106.12.214.128 port 43649 ssh2 Nov 20 11:49:17 Tower sshd[28021]: Received disconnect from 106.12.214.128 port 43649:11: Bye Bye [preauth] Nov 20 11:49:17 Tower sshd[28021]: Disconnected from invalid user fricke 106.12.214.128 port 43649 [preauth] |
2019-11-21 02:50:20 |
118.70.190.188 | attack | Nov 20 08:23:40 sachi sshd\[13308\]: Invalid user jakob from 118.70.190.188 Nov 20 08:23:40 sachi sshd\[13308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.190.188 Nov 20 08:23:42 sachi sshd\[13308\]: Failed password for invalid user jakob from 118.70.190.188 port 35544 ssh2 Nov 20 08:27:39 sachi sshd\[13634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.190.188 user=backup Nov 20 08:27:40 sachi sshd\[13634\]: Failed password for backup from 118.70.190.188 port 46626 ssh2 |
2019-11-21 02:32:26 |
117.241.70.217 | attack | Unauthorized IMAP connection attempt |
2019-11-21 02:32:42 |
159.65.148.115 | attackspam | Nov 20 15:36:39 localhost sshd\[12014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.115 user=root Nov 20 15:36:41 localhost sshd\[12014\]: Failed password for root from 159.65.148.115 port 33666 ssh2 Nov 20 15:41:10 localhost sshd\[12457\]: Invalid user host from 159.65.148.115 port 41774 Nov 20 15:41:10 localhost sshd\[12457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.115 |
2019-11-21 02:52:41 |