City: Sydney
Region: New South Wales
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.218.38.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.218.38.134. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023010601 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 07 02:10:27 CST 2023
;; MSG SIZE rcvd: 107
134.38.218.139.in-addr.arpa domain name pointer 139-218-38-134.sta.wbroadband.net.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.38.218.139.in-addr.arpa name = 139-218-38-134.sta.wbroadband.net.au.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
156.96.56.15 | attackspam | SMTPAttack |
2019-11-04 07:35:04 |
95.85.193.66 | attackbots | Unauthorized connection attempt from IP address 95.85.193.66 on Port 445(SMB) |
2019-11-04 07:13:54 |
78.187.34.101 | attack | Automatic report - Banned IP Access |
2019-11-04 07:31:42 |
61.84.240.87 | attackbotsspam | firewall-block, port(s): 23/tcp |
2019-11-04 07:21:01 |
116.101.146.106 | attack | Unauthorized connection attempt from IP address 116.101.146.106 on Port 445(SMB) |
2019-11-04 07:13:22 |
222.186.175.167 | attackspam | Nov 3 19:47:48 firewall sshd[21844]: Failed password for root from 222.186.175.167 port 8494 ssh2 Nov 3 19:47:52 firewall sshd[21844]: Failed password for root from 222.186.175.167 port 8494 ssh2 Nov 3 19:47:56 firewall sshd[21844]: Failed password for root from 222.186.175.167 port 8494 ssh2 ... |
2019-11-04 07:10:40 |
54.37.139.235 | attackspam | Nov 3 22:56:04 venus sshd\[17167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.235 user=root Nov 3 22:56:06 venus sshd\[17167\]: Failed password for root from 54.37.139.235 port 45246 ssh2 Nov 3 23:00:15 venus sshd\[17274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.235 user=root ... |
2019-11-04 07:30:07 |
79.2.206.234 | attackspam | Automatic report - Banned IP Access |
2019-11-04 07:20:06 |
165.225.72.202 | attackspambots | Unauthorized connection attempt from IP address 165.225.72.202 on Port 445(SMB) |
2019-11-04 07:04:00 |
104.244.72.98 | attack | Nov 4 00:28:16 host sshd[10342]: Invalid user fake from 104.244.72.98 port 50726 ... |
2019-11-04 07:33:54 |
51.252.217.202 | attack | Unauthorized connection attempt from IP address 51.252.217.202 on Port 445(SMB) |
2019-11-04 07:30:32 |
45.136.110.24 | attack | Nov 3 23:56:19 mc1 kernel: \[4108087.678342\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.24 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=62856 PROTO=TCP SPT=47877 DPT=30789 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 3 23:56:27 mc1 kernel: \[4108095.809753\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.24 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=63551 PROTO=TCP SPT=47877 DPT=46889 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 3 23:57:07 mc1 kernel: \[4108135.246645\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.24 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=7306 PROTO=TCP SPT=47877 DPT=32789 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-04 07:25:54 |
82.102.173.73 | attackbotsspam | firewall-block, port(s): 9200/tcp |
2019-11-04 07:12:15 |
173.241.21.82 | attackbots | k+ssh-bruteforce |
2019-11-04 07:11:35 |
89.165.3.1 | attack | Unauthorized connection attempt from IP address 89.165.3.1 on Port 445(SMB) |
2019-11-04 06:57:07 |