City: unknown
Region: unknown
Country: New Zealand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.80.132.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.80.132.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:10:31 CST 2025
;; MSG SIZE rcvd: 106
91.132.80.139.in-addr.arpa domain name pointer uoo-dtn-05.otago.ac.nz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.132.80.139.in-addr.arpa name = uoo-dtn-05.otago.ac.nz.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.175.183 | attack | Jan 12 01:22:35 vmd17057 sshd\[10000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Jan 12 01:22:37 vmd17057 sshd\[10000\]: Failed password for root from 222.186.175.183 port 63864 ssh2 Jan 12 01:22:40 vmd17057 sshd\[10000\]: Failed password for root from 222.186.175.183 port 63864 ssh2 ... |
2020-01-12 08:25:50 |
| 222.186.42.136 | attackbotsspam | Jan 12 01:26:49 srv1-bit sshd[29770]: User root from 222.186.42.136 not allowed because not listed in AllowUsers Jan 12 01:33:06 srv1-bit sshd[29866]: User root from 222.186.42.136 not allowed because not listed in AllowUsers ... |
2020-01-12 08:44:31 |
| 114.239.107.46 | attackspambots | ET WEB_SPECIFIC_APPS ECSHOP user.php SQL INJECTION via Referer |
2020-01-12 08:52:56 |
| 123.55.87.92 | attack | Jan 12 02:37:44 www sshd\[26060\]: Invalid user tCZq from 123.55.87.92 Jan 12 02:37:44 www sshd\[26060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.55.87.92 Jan 12 02:37:46 www sshd\[26060\]: Failed password for invalid user tCZq from 123.55.87.92 port 5665 ssh2 ... |
2020-01-12 08:49:28 |
| 165.227.203.162 | attack | Invalid user adm from 165.227.203.162 port 57722 |
2020-01-12 08:26:27 |
| 217.147.226.156 | attackspam | Jan 11 21:52:55 ns382633 sshd\[11269\]: Invalid user sven from 217.147.226.156 port 47390 Jan 11 21:52:55 ns382633 sshd\[11269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.147.226.156 Jan 11 21:52:57 ns382633 sshd\[11269\]: Failed password for invalid user sven from 217.147.226.156 port 47390 ssh2 Jan 11 22:03:15 ns382633 sshd\[13134\]: Invalid user ubuntu from 217.147.226.156 port 44460 Jan 11 22:03:15 ns382633 sshd\[13134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.147.226.156 |
2020-01-12 08:52:00 |
| 111.72.194.213 | attack | 2020-01-11 15:03:25 dovecot_login authenticator failed for (fexfu) [111.72.194.213]:58935 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhouwei@lerctr.org) 2020-01-11 15:03:32 dovecot_login authenticator failed for (domom) [111.72.194.213]:58935 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhouwei@lerctr.org) 2020-01-11 15:03:44 dovecot_login authenticator failed for (hadtw) [111.72.194.213]:58935 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhouwei@lerctr.org) ... |
2020-01-12 08:36:25 |
| 185.175.93.105 | attackbotsspam | 01/12/2020-01:32:13.765906 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-12 08:46:12 |
| 119.29.143.174 | attackspam | Jan 11 23:47:42 server sshd\[28097\]: Invalid user tomas from 119.29.143.174 Jan 11 23:47:42 server sshd\[28097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.143.174 Jan 11 23:47:43 server sshd\[28097\]: Failed password for invalid user tomas from 119.29.143.174 port 40966 ssh2 Jan 12 00:03:13 server sshd\[31862\]: Invalid user guest from 119.29.143.174 Jan 12 00:03:13 server sshd\[31862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.143.174 ... |
2020-01-12 08:53:31 |
| 51.75.29.61 | attackspambots | Jan 12 00:04:12 * sshd[15693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.29.61 Jan 12 00:04:14 * sshd[15693]: Failed password for invalid user postgres from 51.75.29.61 port 52684 ssh2 |
2020-01-12 08:34:21 |
| 186.91.98.195 | attack | Unauthorized connection attempt detected from IP address 186.91.98.195 to port 445 |
2020-01-12 08:27:05 |
| 27.73.226.159 | attack | Jan 11 21:48:16 mxgate1 postfix/postscreen[7136]: CONNECT from [27.73.226.159]:38874 to [176.31.12.44]:25 Jan 11 21:48:16 mxgate1 postfix/dnsblog[7138]: addr 27.73.226.159 listed by domain cbl.abuseat.org as 127.0.0.2 Jan 11 21:48:16 mxgate1 postfix/dnsblog[7158]: addr 27.73.226.159 listed by domain zen.spamhaus.org as 127.0.0.3 Jan 11 21:48:16 mxgate1 postfix/dnsblog[7158]: addr 27.73.226.159 listed by domain zen.spamhaus.org as 127.0.0.11 Jan 11 21:48:16 mxgate1 postfix/dnsblog[7158]: addr 27.73.226.159 listed by domain zen.spamhaus.org as 127.0.0.4 Jan 11 21:48:16 mxgate1 postfix/dnsblog[7139]: addr 27.73.226.159 listed by domain bl.spamcop.net as 127.0.0.2 Jan 11 21:48:17 mxgate1 postfix/dnsblog[7137]: addr 27.73.226.159 listed by domain b.barracudacentral.org as 127.0.0.2 Jan 11 21:48:22 mxgate1 postfix/postscreen[7136]: DNSBL rank 5 for [27.73.226.159]:38874 Jan 11 21:48:22 mxgate1 postfix/tlsproxy[7193]: CONNECT from [27.73.226.159]:38874 Jan x@x Jan 11 21:48:25 ........ ------------------------------- |
2020-01-12 08:52:13 |
| 92.207.180.50 | attackbots | Jan 11 23:08:15 mout sshd[5562]: Invalid user upload from 92.207.180.50 port 60537 |
2020-01-12 08:42:19 |
| 45.10.24.23 | attackspambots | Fail2Ban Ban Triggered |
2020-01-12 08:50:43 |
| 139.155.90.36 | attackspambots | Jan 11 20:36:58 firewall sshd[7523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.90.36 Jan 11 20:36:58 firewall sshd[7523]: Invalid user emo from 139.155.90.36 Jan 11 20:37:00 firewall sshd[7523]: Failed password for invalid user emo from 139.155.90.36 port 35028 ssh2 ... |
2020-01-12 08:23:17 |