City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.12.161.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.12.161.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 04:39:33 CST 2025
;; MSG SIZE rcvd: 106
Host 39.161.12.140.in-addr.arpa not found: 2(SERVFAIL)
server can't find 140.12.161.39.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.54.160.38 | attack | firewall-block, port(s): 3854/tcp, 5632/tcp, 5914/tcp, 8838/tcp, 9925/tcp, 9935/tcp, 10774/tcp, 11485/tcp, 12642/tcp, 14460/tcp, 16000/tcp, 16866/tcp, 16870/tcp, 19964/tcp, 20808/tcp, 21026/tcp, 21034/tcp, 21315/tcp, 21326/tcp, 21358/tcp, 21857/tcp, 21869/tcp, 22046/tcp, 22649/tcp, 22865/tcp, 23285/tcp, 23457/tcp, 24076/tcp, 24161/tcp, 27877/tcp, 28636/tcp, 32128/tcp, 32951/tcp, 36145/tcp, 37032/tcp, 38021/tcp, 38186/tcp, 38241/tcp, 39167/tcp, 39221/tcp, 39677/tcp, 39836/tcp, 42314/tcp, 42425/tcp, 43804/tcp, 45450/tcp, 45712/tcp, 46142/tcp, 46285/tcp, 46289/tcp, 46602/tcp, 47126/tcp, 47130/tcp, 51414/tcp, 52572/tcp, 52609/tcp, 53379/tcp, 53391/tcp, 54138/tcp, 55175/tcp, 55183/tcp, 55199/tcp, 55785/tcp, 58471/tcp, 58479/tcp, 58666/tcp, 59505/tcp, 61241/tcp, 64374/tcp |
2020-08-11 04:30:35 |
| 106.12.123.239 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-10T20:24:06Z and 2020-08-10T20:32:15Z |
2020-08-11 04:34:18 |
| 202.142.151.6 | attack | Unauthorized connection attempt from IP address 202.142.151.6 on Port 445(SMB) |
2020-08-11 04:35:26 |
| 46.29.164.139 | attackspam | Vulnerability scan and SQL injection attempts |
2020-08-11 04:21:55 |
| 192.99.34.142 | attack | CF RAY ID: 5c0a27bc8e89ece6 IP Class: noRecord URI: /wp-login.php |
2020-08-11 04:08:30 |
| 178.62.33.222 | attackspambots | 178.62.33.222 - - [10/Aug/2020:13:00:47 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.33.222 - - [10/Aug/2020:13:00:48 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.62.33.222 - - [10/Aug/2020:13:00:48 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-11 04:03:49 |
| 141.98.10.198 | attackspambots | 5x Failed Password |
2020-08-11 04:06:01 |
| 180.76.242.171 | attackspambots | detected by Fail2Ban |
2020-08-11 04:30:52 |
| 42.116.159.241 | attack | Unauthorized connection attempt from IP address 42.116.159.241 on Port 445(SMB) |
2020-08-11 04:26:52 |
| 210.97.40.102 | attackbots | Aug 10 21:32:59 mellenthin sshd[19550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.97.40.102 user=root Aug 10 21:33:01 mellenthin sshd[19550]: Failed password for invalid user root from 210.97.40.102 port 44458 ssh2 |
2020-08-11 04:19:38 |
| 180.168.212.6 | attackspam | Aug 10 19:37:37 root sshd[1626]: Failed password for root from 180.168.212.6 port 2099 ssh2 Aug 10 19:48:24 root sshd[3051]: Failed password for root from 180.168.212.6 port 2100 ssh2 ... |
2020-08-11 04:14:02 |
| 116.96.171.224 | attackspambots | Unauthorized connection attempt from IP address 116.96.171.224 on Port 445(SMB) |
2020-08-11 04:19:26 |
| 27.79.231.73 | attackbots | Unauthorized connection attempt from IP address 27.79.231.73 on Port 445(SMB) |
2020-08-11 04:37:25 |
| 157.37.247.226 | attackbotsspam | Unauthorized connection attempt from IP address 157.37.247.226 on Port 445(SMB) |
2020-08-11 04:17:29 |
| 51.79.55.141 | attack | Tried sshing with brute force. |
2020-08-11 04:35:07 |