City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.248.164.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.248.164.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025053001 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 31 05:53:23 CST 2025
;; MSG SIZE rcvd: 108
Host 124.164.248.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 124.164.248.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
49.233.80.20 | attackbots | Unauthorized connection attempt detected from IP address 49.233.80.20 to port 2220 [J] |
2020-01-15 04:15:40 |
2.139.209.78 | attackbotsspam | Unauthorized connection attempt detected from IP address 2.139.209.78 to port 2220 [J] |
2020-01-15 04:19:30 |
49.235.84.51 | attack | Jan 14 19:53:39 srv01 sshd[27896]: Invalid user vmi from 49.235.84.51 port 51070 Jan 14 19:53:39 srv01 sshd[27896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.84.51 Jan 14 19:53:39 srv01 sshd[27896]: Invalid user vmi from 49.235.84.51 port 51070 Jan 14 19:53:40 srv01 sshd[27896]: Failed password for invalid user vmi from 49.235.84.51 port 51070 ssh2 Jan 14 19:56:24 srv01 sshd[28098]: Invalid user xavier from 49.235.84.51 port 47062 ... |
2020-01-15 04:15:01 |
187.189.232.190 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.189.232.190 to port 22 [J] |
2020-01-15 03:48:01 |
104.168.87.199 | attack | SSH brute force |
2020-01-15 04:07:33 |
58.23.16.254 | attackbots | Automatic report - SSH Brute-Force Attack |
2020-01-15 04:13:17 |
51.75.202.218 | attackspam | Oct 28 01:30:08 odroid64 sshd\[11058\]: Invalid user uk from 51.75.202.218 Oct 28 01:30:08 odroid64 sshd\[11058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.202.218 Oct 28 01:30:08 odroid64 sshd\[11058\]: Invalid user uk from 51.75.202.218 Oct 28 01:30:08 odroid64 sshd\[11058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.202.218 Oct 28 01:30:10 odroid64 sshd\[11058\]: Failed password for invalid user uk from 51.75.202.218 port 43892 ssh2 ... |
2020-01-15 04:14:19 |
3.16.1.103 | attackspambots | Invalid user tiago from 3.16.1.103 port 46288 |
2020-01-15 03:41:53 |
132.232.29.49 | attack | Unauthorized connection attempt detected from IP address 132.232.29.49 to port 2220 [J] |
2020-01-15 03:58:02 |
103.134.3.58 | attackbotsspam | Invalid user admin from 103.134.3.58 port 37748 |
2020-01-15 04:08:13 |
159.89.201.59 | attackspam | Nov 30 12:34:49 odroid64 sshd\[27350\]: User root from 159.89.201.59 not allowed because not listed in AllowUsers Nov 30 12:34:49 odroid64 sshd\[27350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.59 user=root ... |
2020-01-15 03:54:25 |
103.89.89.248 | attackspambots | Invalid user admin from 103.89.89.248 port 52792 |
2020-01-15 04:08:31 |
218.89.174.33 | attackspam | Invalid user admin from 218.89.174.33 port 58276 |
2020-01-15 03:43:33 |
220.179.249.21 | attackspam | Invalid user admin from 220.179.249.21 port 33419 |
2020-01-15 04:20:46 |
130.180.193.73 | attackbotsspam | Invalid user secretaria from 130.180.193.73 port 38725 |
2020-01-15 03:58:17 |