City: Keputih
Region: Jawa Timur
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.228.66.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.228.66.139. IN A
;; AUTHORITY SECTION:
. 228 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022122900 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 29 22:23:07 CST 2022
;; MSG SIZE rcvd: 107
139.66.228.139.in-addr.arpa domain name pointer fm-dyn-139-228-66-139.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.66.228.139.in-addr.arpa name = fm-dyn-139-228-66-139.fast.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
173.212.224.117 | attack | blogonese.net 173.212.224.117 \[07/Aug/2019:19:28:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" blogonese.net 173.212.224.117 \[07/Aug/2019:19:28:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-08-08 09:50:39 |
77.40.33.40 | attackbots | 2019-08-07T20:25:55.499191mail01 postfix/smtpd[8640]: warning: unknown[77.40.33.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-08-07T20:30:04.268514mail01 postfix/smtpd[31391]: warning: unknown[77.40.33.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-08-07T20:33:40.182151mail01 postfix/smtpd[30475]: warning: unknown[77.40.33.40]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-08-08 09:34:43 |
81.22.45.148 | attackbots | Port scan on 17 port(s): 8088 8241 8333 8347 8372 8423 8461 8466 8521 8709 8752 8776 8895 8939 8949 8979 9632 |
2019-08-08 09:34:16 |
180.101.249.129 | attackspambots | Automatic report - Banned IP Access |
2019-08-08 09:55:14 |
51.75.122.16 | attackspam | Aug 8 02:58:36 SilenceServices sshd[11777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.122.16 Aug 8 02:58:39 SilenceServices sshd[11777]: Failed password for invalid user kyle from 51.75.122.16 port 46460 ssh2 Aug 8 03:04:14 SilenceServices sshd[18822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.122.16 |
2019-08-08 09:45:00 |
31.208.65.235 | attack | Aug 7 20:28:30 server01 sshd\[17887\]: Invalid user user from 31.208.65.235 Aug 7 20:28:30 server01 sshd\[17887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.208.65.235 Aug 7 20:28:32 server01 sshd\[17887\]: Failed password for invalid user user from 31.208.65.235 port 41060 ssh2 ... |
2019-08-08 09:54:46 |
217.115.10.132 | attack | 2019-07-17T20:02:59.281865wiz-ks3 sshd[17188]: Invalid user admin from 217.115.10.132 port 44985 2019-07-17T20:02:59.283916wiz-ks3 sshd[17188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor2.anonymizer.ccc.de 2019-07-17T20:02:59.281865wiz-ks3 sshd[17188]: Invalid user admin from 217.115.10.132 port 44985 2019-07-17T20:03:01.592513wiz-ks3 sshd[17188]: Failed password for invalid user admin from 217.115.10.132 port 44985 ssh2 2019-07-17T20:02:59.283916wiz-ks3 sshd[17188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor2.anonymizer.ccc.de 2019-07-17T20:02:59.281865wiz-ks3 sshd[17188]: Invalid user admin from 217.115.10.132 port 44985 2019-07-17T20:03:01.592513wiz-ks3 sshd[17188]: Failed password for invalid user admin from 217.115.10.132 port 44985 ssh2 2019-07-17T20:03:03.944046wiz-ks3 sshd[17188]: Failed password for invalid user admin from 217.115.10.132 port 44985 ssh2 2019-07-17T20:02:59.283916wiz-ks3 sshd[17188]: pam_ |
2019-08-08 09:47:25 |
206.189.232.45 | attackbots | k+ssh-bruteforce |
2019-08-08 10:09:26 |
104.248.4.117 | attackbotsspam | 2019-08-08T00:24:16.047853abusebot-6.cloudsearch.cf sshd\[22998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.4.117 user=root |
2019-08-08 10:22:20 |
109.234.38.61 | attackspambots | 0,75-13/38 [bc03/m259] concatform PostRequest-Spammer scoring: Lusaka01 |
2019-08-08 09:45:25 |
157.230.235.233 | attackbotsspam | Invalid user flavio from 157.230.235.233 port 53298 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233 Failed password for invalid user flavio from 157.230.235.233 port 53298 ssh2 Invalid user ftpuser from 157.230.235.233 port 50466 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233 |
2019-08-08 10:18:41 |
159.89.166.50 | attack | Automatic report |
2019-08-08 09:43:23 |
5.39.82.197 | attackspambots | Aug 8 01:05:10 MK-Soft-VM6 sshd\[21627\]: Invalid user jasper from 5.39.82.197 port 42124 Aug 8 01:05:10 MK-Soft-VM6 sshd\[21627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.82.197 Aug 8 01:05:12 MK-Soft-VM6 sshd\[21627\]: Failed password for invalid user jasper from 5.39.82.197 port 42124 ssh2 ... |
2019-08-08 09:39:32 |
122.14.209.213 | attackspam | $f2bV_matches |
2019-08-08 09:58:17 |
27.73.111.10 | attack | Automatic report - Port Scan Attack |
2019-08-08 09:38:50 |