City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.71.147.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.71.147.104. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 05:54:58 CST 2025
;; MSG SIZE rcvd: 107
Host 104.147.71.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.147.71.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
191.53.248.145 | attackspam | failed_logins |
2019-08-07 11:20:40 |
94.177.227.47 | attackspam | 08/06/2019-17:39:09.966231 94.177.227.47 Protocol: 17 ET VOIP Modified Sipvicious Asterisk PBX User-Agent |
2019-08-07 11:39:23 |
216.244.66.245 | attack | 20 attempts against mh-misbehave-ban on pluto.magehost.pro |
2019-08-07 11:52:06 |
188.254.75.94 | attackbotsspam | [portscan] Port scan |
2019-08-07 11:18:05 |
81.88.106.110 | attackbots | 23/tcp [2019-08-06]1pkt |
2019-08-07 11:32:45 |
221.201.212.136 | attackbots | 23/tcp [2019-08-06]1pkt |
2019-08-07 11:38:55 |
13.76.182.152 | attackbots | 6379/tcp [2019-08-04/06]2pkt |
2019-08-07 12:16:33 |
95.30.205.182 | attackbots | 445/tcp 139/tcp [2019-08-06]2pkt |
2019-08-07 12:17:53 |
218.86.123.242 | attackspambots | Aug 7 00:56:56 www sshd\[27043\]: Invalid user ftp from 218.86.123.242Aug 7 00:56:58 www sshd\[27043\]: Failed password for invalid user ftp from 218.86.123.242 port 48626 ssh2Aug 7 01:00:45 www sshd\[27065\]: Invalid user sap from 218.86.123.242 ... |
2019-08-07 12:19:11 |
27.23.29.118 | attackbots | Aug 6 21:38:44 sshgateway sshd\[30765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.23.29.118 user=root Aug 6 21:38:46 sshgateway sshd\[30765\]: Failed password for root from 27.23.29.118 port 35794 ssh2 Aug 6 21:38:48 sshgateway sshd\[30765\]: Failed password for root from 27.23.29.118 port 35794 ssh2 |
2019-08-07 11:57:10 |
39.76.195.33 | attackspam | Aug 6 21:38:53 DDOS Attack: SRC=39.76.195.33 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=48 DF PROTO=TCP SPT=17387 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 |
2019-08-07 11:53:16 |
222.122.94.10 | attackbotsspam | Aug 7 00:23:09 pornomens sshd\[29869\]: Invalid user jesus from 222.122.94.10 port 33894 Aug 7 00:23:09 pornomens sshd\[29869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.122.94.10 Aug 7 00:23:11 pornomens sshd\[29869\]: Failed password for invalid user jesus from 222.122.94.10 port 33894 ssh2 ... |
2019-08-07 11:26:27 |
27.115.124.6 | attackbotsspam | 3389BruteforceFW21 |
2019-08-07 11:35:26 |
118.136.227.224 | attackbotsspam | 60001/tcp [2019-08-06]1pkt |
2019-08-07 11:36:36 |
185.220.101.25 | attack | Aug 7 02:31:10 MK-Soft-VM5 sshd\[13700\]: Invalid user administrator from 185.220.101.25 port 43593 Aug 7 02:31:10 MK-Soft-VM5 sshd\[13700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.25 Aug 7 02:31:12 MK-Soft-VM5 sshd\[13700\]: Failed password for invalid user administrator from 185.220.101.25 port 43593 ssh2 ... |
2019-08-07 11:42:49 |