City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.65.70.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.65.70.215. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:07:48 CST 2025
;; MSG SIZE rcvd: 106
Host 215.70.65.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 215.70.65.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.65.2.5 | attack | This IP address was blacklisted for the following reason: /de/jobs/fahrer-mit-fuehrerschein-ce-m-w-d/&%22%20or%20(1,2)=(select*from(select%20name_const(CHAR(76,76,82,98,78,106,75,67,102),1),name_const(CHAR(76,76,82,98,78,106,75,67,102),1))a)%20--%20%22x%22=%22x @ 2018-10-15T00:49:43+02:00. |
2019-08-05 12:22:03 |
| 13.66.139.0 | attackspambots | Port Scan: TCP/443 |
2019-08-05 12:49:42 |
| 14.48.127.169 | attackspam | Port Scan: UDP/36266 |
2019-08-05 12:32:56 |
| 104.153.184.60 | attackspam | Port Scan: UDP/137 |
2019-08-05 12:03:24 |
| 46.45.143.35 | attack | WordPress XMLRPC scan :: 46.45.143.35 0.952 BYPASS [05/Aug/2019:13:59:18 1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 503 19380 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-05 12:58:43 |
| 132.148.86.231 | attack | Port Scan: TCP/445 |
2019-08-05 12:22:43 |
| 91.204.114.68 | attack | Autoban 91.204.114.68 AUTH/CONNECT |
2019-08-05 13:02:56 |
| 165.22.237.205 | attackbotsspam | Port Scan: TCP/8088 |
2019-08-05 11:55:43 |
| 173.199.118.131 | attack | Port Scan: TCP/445 |
2019-08-05 11:53:40 |
| 67.79.51.11 | attackbotsspam | Port Scan: UDP/137 |
2019-08-05 12:47:06 |
| 101.81.79.237 | attackspambots | Aug 4 17:44:34 rb06 sshd[1844]: Failed password for invalid user guest from 101.81.79.237 port 50718 ssh2 Aug 4 17:44:35 rb06 sshd[1844]: Received disconnect from 101.81.79.237: 11: Bye Bye [preauth] Aug 4 18:00:08 rb06 sshd[7789]: Failed password for invalid user test from 101.81.79.237 port 48854 ssh2 Aug 4 18:00:08 rb06 sshd[7789]: Received disconnect from 101.81.79.237: 11: Bye Bye [preauth] Aug 4 18:05:36 rb06 sshd[30855]: Failed password for invalid user spark from 101.81.79.237 port 52492 ssh2 Aug 4 18:05:37 rb06 sshd[30855]: Received disconnect from 101.81.79.237: 11: Bye Bye [preauth] Aug 4 18:10:51 rb06 sshd[2597]: Failed password for invalid user shelby from 101.81.79.237 port 55642 ssh2 Aug 4 18:10:51 rb06 sshd[2597]: Received disconnect from 101.81.79.237: 11: Bye Bye [preauth] Aug 4 18:16:05 rb06 sshd[2724]: Failed password for invalid user devuser from 101.81.79.237 port 58704 ssh2 Aug 4 18:16:06 rb06 sshd[2724]: Received disconnect from 101.81......... ------------------------------- |
2019-08-05 12:53:21 |
| 91.205.131.55 | attack | email spam |
2019-08-05 13:02:24 |
| 106.111.165.41 | attack | Port Scan: TCP/2323 |
2019-08-05 12:24:40 |
| 162.247.99.169 | attack | 3389BruteforceFW21 |
2019-08-05 12:51:43 |
| 201.1.201.55 | attackbotsspam | Port Scan: TCP/8080 |
2019-08-05 12:35:22 |