City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.252.238.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.252.238.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:09:44 CST 2025
;; MSG SIZE rcvd: 107
Host 44.238.252.139.in-addr.arpa not found: 2(SERVFAIL)
server can't find 139.252.238.44.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
136.144.242.253 | attackspambots | *Port Scan* detected from 136.144.242.253 (NL/Netherlands/South Holland/Rotterdam/136-144-242-253.colo.transip.net). 4 hits in the last 170 seconds |
2020-08-09 17:26:32 |
185.175.93.3 | attackbotsspam | Aug 9 12:07:46 venus kernel: [155171.215161] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:66:8f:ed:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.3 DST=78.47.70.226 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=47027 PROTO=TCP SPT=43445 DPT=17798 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-09 17:31:37 |
5.188.62.147 | attackspambots | 5.188.62.147 - - [09/Aug/2020:09:48:36 +0100] "POST /wp-login.php HTTP/1.1" 200 2013 "-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36" 5.188.62.147 - - [09/Aug/2020:09:48:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36" 5.188.62.147 - - [09/Aug/2020:09:48:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2224.3 Safari/537.36" ... |
2020-08-09 17:10:55 |
84.17.47.82 | attackbotsspam | sew-(visforms) : try to access forms... |
2020-08-09 17:05:23 |
124.67.66.50 | attackbotsspam | 2020-08-09 01:51:12.473313-0500 localhost sshd[50924]: Failed password for root from 124.67.66.50 port 39672 ssh2 |
2020-08-09 17:24:39 |
45.129.33.24 | attack | Sent packet to closed port: 21933 |
2020-08-09 17:15:30 |
124.226.2.70 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 62 |
2020-08-09 17:00:22 |
122.51.188.20 | attackspambots | Aug 8 22:49:34 dignus sshd[28026]: Failed password for root from 122.51.188.20 port 44438 ssh2 Aug 8 22:52:20 dignus sshd[28487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.188.20 user=root Aug 8 22:52:22 dignus sshd[28487]: Failed password for root from 122.51.188.20 port 42608 ssh2 Aug 8 22:55:14 dignus sshd[28838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.188.20 user=root Aug 8 22:55:16 dignus sshd[28838]: Failed password for root from 122.51.188.20 port 40778 ssh2 ... |
2020-08-09 17:03:58 |
106.12.198.232 | attackbotsspam | $f2bV_matches |
2020-08-09 17:15:15 |
46.21.249.141 | attackspam | Aug 9 11:22:15 lnxded64 sshd[3625]: Failed password for root from 46.21.249.141 port 37090 ssh2 Aug 9 11:22:18 lnxded64 sshd[3625]: Failed password for root from 46.21.249.141 port 37090 ssh2 Aug 9 11:22:20 lnxded64 sshd[3625]: Failed password for root from 46.21.249.141 port 37090 ssh2 Aug 9 11:22:22 lnxded64 sshd[3625]: Failed password for root from 46.21.249.141 port 37090 ssh2 |
2020-08-09 17:24:09 |
39.66.174.185 | attack | Telnet Honeypot -> Telnet Bruteforce / Login |
2020-08-09 16:52:26 |
193.112.126.64 | attack | 20 attempts against mh-ssh on cloud |
2020-08-09 17:35:59 |
218.149.128.186 | attackspam | 2020-08-09 03:54:31.036331-0500 localhost sshd[79212]: Failed password for root from 218.149.128.186 port 58626 ssh2 |
2020-08-09 17:32:46 |
192.241.132.115 | attackbotsspam | Automatic report - Banned IP Access |
2020-08-09 17:30:13 |
89.43.139.166 | attackbots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-08-09 17:08:26 |