City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.83.50.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.83.50.196. IN A
;; AUTHORITY SECTION:
. 303 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031700 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 17 19:24:39 CST 2022
;; MSG SIZE rcvd: 106
Host 196.50.83.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 196.50.83.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
148.66.134.85 | attack | Apr 17 11:33:34 lukav-desktop sshd\[10646\]: Invalid user git from 148.66.134.85 Apr 17 11:33:34 lukav-desktop sshd\[10646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.134.85 Apr 17 11:33:37 lukav-desktop sshd\[10646\]: Failed password for invalid user git from 148.66.134.85 port 49992 ssh2 Apr 17 11:36:45 lukav-desktop sshd\[10775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.134.85 user=root Apr 17 11:36:47 lukav-desktop sshd\[10775\]: Failed password for root from 148.66.134.85 port 37496 ssh2 |
2020-04-17 18:14:52 |
51.38.32.230 | attack | 2020-04-16 UTC: (20x) - admin(3x),ax,backup,bk,daijiabao,eg,hl,mi,root(6x),rq,testbed,vk,ym |
2020-04-17 18:26:19 |
106.12.119.1 | attackspambots | Apr 17 13:41:04 itv-usvr-01 sshd[1377]: Invalid user bf from 106.12.119.1 Apr 17 13:41:04 itv-usvr-01 sshd[1377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.119.1 Apr 17 13:41:04 itv-usvr-01 sshd[1377]: Invalid user bf from 106.12.119.1 Apr 17 13:41:06 itv-usvr-01 sshd[1377]: Failed password for invalid user bf from 106.12.119.1 port 36405 ssh2 |
2020-04-17 18:16:24 |
31.220.2.100 | attackspam | sshd jail - ssh hack attempt |
2020-04-17 18:31:14 |
129.211.97.151 | attackspambots | Apr 17 08:05:43 master sshd[10846]: Failed password for invalid user bu from 129.211.97.151 port 47412 ssh2 Apr 17 08:17:25 master sshd[10992]: Failed password for root from 129.211.97.151 port 32768 ssh2 Apr 17 08:23:25 master sshd[11041]: Failed password for invalid user oracle from 129.211.97.151 port 36016 ssh2 Apr 17 08:28:55 master sshd[11055]: Failed password for root from 129.211.97.151 port 39226 ssh2 Apr 17 08:34:27 master sshd[11485]: Failed password for invalid user fv from 129.211.97.151 port 42448 ssh2 Apr 17 08:40:04 master sshd[11535]: Failed password for root from 129.211.97.151 port 45682 ssh2 Apr 17 08:45:27 master sshd[11628]: Failed password for invalid user admin from 129.211.97.151 port 48910 ssh2 Apr 17 08:51:22 master sshd[11686]: Failed password for invalid user ftpuser from 129.211.97.151 port 52140 ssh2 Apr 17 08:56:52 master sshd[11699]: Failed password for root from 129.211.97.151 port 55368 ssh2 |
2020-04-17 18:09:05 |
144.21.103.101 | attackspambots | Brute force SMTP login attempted. ... |
2020-04-17 18:06:44 |
51.83.42.108 | attack | Apr 17 11:13:12 ift sshd\[34373\]: Invalid user zo from 51.83.42.108Apr 17 11:13:14 ift sshd\[34373\]: Failed password for invalid user zo from 51.83.42.108 port 49362 ssh2Apr 17 11:17:48 ift sshd\[35157\]: Failed password for root from 51.83.42.108 port 54802 ssh2Apr 17 11:20:12 ift sshd\[35466\]: Invalid user bb from 51.83.42.108Apr 17 11:20:13 ift sshd\[35466\]: Failed password for invalid user bb from 51.83.42.108 port 42442 ssh2 ... |
2020-04-17 18:01:45 |
35.171.35.33 | attackbots | Apr 17 00:21:01 php1 sshd\[2075\]: Invalid user hk from 35.171.35.33 Apr 17 00:21:01 php1 sshd\[2075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.171.35.33 Apr 17 00:21:03 php1 sshd\[2075\]: Failed password for invalid user hk from 35.171.35.33 port 58154 ssh2 Apr 17 00:23:40 php1 sshd\[2322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.171.35.33 user=root Apr 17 00:23:42 php1 sshd\[2322\]: Failed password for root from 35.171.35.33 port 52586 ssh2 |
2020-04-17 18:32:15 |
106.243.2.244 | attackbots | Apr 17 10:36:54 vps58358 sshd\[32393\]: Invalid user kt from 106.243.2.244Apr 17 10:36:56 vps58358 sshd\[32393\]: Failed password for invalid user kt from 106.243.2.244 port 53382 ssh2Apr 17 10:39:28 vps58358 sshd\[32499\]: Invalid user iu from 106.243.2.244Apr 17 10:39:30 vps58358 sshd\[32499\]: Failed password for invalid user iu from 106.243.2.244 port 34784 ssh2Apr 17 10:41:39 vps58358 sshd\[32554\]: Invalid user ob from 106.243.2.244Apr 17 10:41:41 vps58358 sshd\[32554\]: Failed password for invalid user ob from 106.243.2.244 port 40398 ssh2 ... |
2020-04-17 18:02:13 |
117.55.241.178 | attackspam | Apr 17 10:48:58 mout sshd[15537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.178 user=root Apr 17 10:49:00 mout sshd[15537]: Failed password for root from 117.55.241.178 port 50636 ssh2 |
2020-04-17 18:33:02 |
114.220.238.72 | attackspam | Apr 17 11:47:21 srv206 sshd[7312]: Invalid user admin from 114.220.238.72 Apr 17 11:47:21 srv206 sshd[7312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.220.238.72 Apr 17 11:47:21 srv206 sshd[7312]: Invalid user admin from 114.220.238.72 Apr 17 11:47:23 srv206 sshd[7312]: Failed password for invalid user admin from 114.220.238.72 port 43924 ssh2 ... |
2020-04-17 18:23:32 |
34.89.255.57 | attackspam | Apr 17 08:19:03 *** sshd[11948]: User root from 34.89.255.57 not allowed because not listed in AllowUsers |
2020-04-17 17:58:13 |
67.205.161.55 | attackbotsspam | Apr 17 07:35:51 h2779839 sshd[6115]: Invalid user test from 67.205.161.55 port 37756 Apr 17 07:35:51 h2779839 sshd[6115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.161.55 Apr 17 07:35:51 h2779839 sshd[6115]: Invalid user test from 67.205.161.55 port 37756 Apr 17 07:35:54 h2779839 sshd[6115]: Failed password for invalid user test from 67.205.161.55 port 37756 ssh2 Apr 17 07:39:40 h2779839 sshd[6218]: Invalid user lk from 67.205.161.55 port 47678 Apr 17 07:39:40 h2779839 sshd[6218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.161.55 Apr 17 07:39:40 h2779839 sshd[6218]: Invalid user lk from 67.205.161.55 port 47678 Apr 17 07:39:43 h2779839 sshd[6218]: Failed password for invalid user lk from 67.205.161.55 port 47678 ssh2 Apr 17 07:43:31 h2779839 sshd[6358]: Invalid user test from 67.205.161.55 port 57598 ... |
2020-04-17 18:15:34 |
167.71.72.70 | attack | Port 12594 scan denied |
2020-04-17 17:55:53 |
171.103.142.2 | attack | Dovecot Invalid User Login Attempt. |
2020-04-17 18:19:16 |