City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.49.94.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.49.94.89. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120400 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 04 18:22:23 CST 2024
;; MSG SIZE rcvd: 105
Host 89.94.49.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 89.94.49.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
162.254.24.232 | attackbotsspam | Spam |
2020-04-16 03:53:26 |
138.68.99.46 | attackspam | 2020-04-13 18:27:16 server sshd[83124]: Failed password for invalid user robyn from 138.68.99.46 port 54074 ssh2 |
2020-04-16 03:52:03 |
41.223.142.211 | attackbots | Apr 15 18:45:46 cdc sshd[14909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211 Apr 15 18:45:48 cdc sshd[14909]: Failed password for invalid user jorgec from 41.223.142.211 port 46222 ssh2 |
2020-04-16 04:13:41 |
111.229.57.21 | attackspam | frenzy |
2020-04-16 04:17:43 |
118.141.159.101 | attackspambots | Honeypot attack, port: 5555, PTR: sr-101-159-141-118-on-nets.com. |
2020-04-16 03:47:37 |
167.99.41.242 | attackbotsspam | Apr 15 20:08:07 srv01 sshd[13772]: Invalid user bos from 167.99.41.242 port 40356 Apr 15 20:08:07 srv01 sshd[13772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.41.242 Apr 15 20:08:07 srv01 sshd[13772]: Invalid user bos from 167.99.41.242 port 40356 Apr 15 20:08:09 srv01 sshd[13772]: Failed password for invalid user bos from 167.99.41.242 port 40356 ssh2 Apr 15 20:12:07 srv01 sshd[14118]: Invalid user wkuser from 167.99.41.242 port 47020 ... |
2020-04-16 04:20:58 |
157.230.230.152 | attackspam | Apr 15 19:27:50 MainVPS sshd[26348]: Invalid user check from 157.230.230.152 port 36864 Apr 15 19:27:50 MainVPS sshd[26348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.230.152 Apr 15 19:27:50 MainVPS sshd[26348]: Invalid user check from 157.230.230.152 port 36864 Apr 15 19:27:52 MainVPS sshd[26348]: Failed password for invalid user check from 157.230.230.152 port 36864 ssh2 Apr 15 19:31:29 MainVPS sshd[29583]: Invalid user bata from 157.230.230.152 port 45300 ... |
2020-04-16 04:07:38 |
186.37.159.126 | attack | Unauthorised access (Apr 15) SRC=186.37.159.126 LEN=52 TTL=113 ID=5482 DF TCP DPT=445 WINDOW=8192 SYN |
2020-04-16 03:57:31 |
125.22.9.186 | attack | Apr 15 21:49:27 markkoudstaal sshd[29893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186 Apr 15 21:49:29 markkoudstaal sshd[29893]: Failed password for invalid user ubuntu from 125.22.9.186 port 50643 ssh2 Apr 15 21:53:31 markkoudstaal sshd[30623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186 |
2020-04-16 03:59:37 |
106.75.35.150 | attackbotsspam | Apr 15 17:37:33 markkoudstaal sshd[24192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.35.150 Apr 15 17:37:35 markkoudstaal sshd[24192]: Failed password for invalid user tm from 106.75.35.150 port 56240 ssh2 Apr 15 17:46:31 markkoudstaal sshd[25570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.35.150 |
2020-04-16 04:05:52 |
106.13.140.33 | attackspam | Apr 15 21:16:31 host sshd[61465]: Invalid user inspur from 106.13.140.33 port 36486 ... |
2020-04-16 03:47:49 |
128.199.95.161 | attack | Apr 15 18:15:47 dev0-dcde-rnet sshd[2941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.161 Apr 15 18:15:50 dev0-dcde-rnet sshd[2941]: Failed password for invalid user test from 128.199.95.161 port 50466 ssh2 Apr 15 18:37:18 dev0-dcde-rnet sshd[3199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.161 |
2020-04-16 04:11:20 |
178.128.49.239 | attack | Apr 15 22:08:23 host sshd[15484]: Invalid user ligh from 178.128.49.239 port 41546 ... |
2020-04-16 04:16:43 |
101.71.3.53 | attackbotsspam | 5x Failed Password |
2020-04-16 03:54:27 |
83.128.80.190 | attackbots | Automatic report - Port Scan Attack |
2020-04-16 04:19:07 |