City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.162.141.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.162.141.219. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 13:53:36 CST 2025
;; MSG SIZE rcvd: 108
Host 219.141.162.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 219.141.162.140.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 59.104.139.59 | attackspambots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-22 06:17:02 |
| 114.4.26.127 | attackbotsspam | Honeypot attack, port: 445, PTR: 114-4-26-127.resources.indosat.com. |
2020-07-22 05:51:52 |
| 142.93.127.195 | attack | Invalid user milutinovic from 142.93.127.195 port 51066 |
2020-07-22 06:08:10 |
| 212.83.183.57 | attack | Jul 21 23:29:44 h1745522 sshd[12385]: Invalid user nagios from 212.83.183.57 port 62080 Jul 21 23:29:44 h1745522 sshd[12385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.183.57 Jul 21 23:29:44 h1745522 sshd[12385]: Invalid user nagios from 212.83.183.57 port 62080 Jul 21 23:29:46 h1745522 sshd[12385]: Failed password for invalid user nagios from 212.83.183.57 port 62080 ssh2 Jul 21 23:31:59 h1745522 sshd[12515]: Invalid user postgres from 212.83.183.57 port 35260 Jul 21 23:31:59 h1745522 sshd[12515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.183.57 Jul 21 23:31:59 h1745522 sshd[12515]: Invalid user postgres from 212.83.183.57 port 35260 Jul 21 23:32:01 h1745522 sshd[12515]: Failed password for invalid user postgres from 212.83.183.57 port 35260 ssh2 Jul 21 23:34:17 h1745522 sshd[12651]: Invalid user tec from 212.83.183.57 port 43006 ... |
2020-07-22 05:55:19 |
| 186.84.172.25 | attackspam | 2020-07-21T22:10:06.540921shield sshd\[30878\]: Invalid user det from 186.84.172.25 port 60550 2020-07-21T22:10:06.552738shield sshd\[30878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25 2020-07-21T22:10:08.640336shield sshd\[30878\]: Failed password for invalid user det from 186.84.172.25 port 60550 ssh2 2020-07-21T22:12:15.107482shield sshd\[31267\]: Invalid user hu from 186.84.172.25 port 35714 2020-07-21T22:12:15.115818shield sshd\[31267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25 |
2020-07-22 06:18:09 |
| 133.130.119.178 | attack | 2020-07-21T17:10:13.0288331495-001 sshd[18297]: Invalid user dax from 133.130.119.178 port 12993 2020-07-21T17:10:15.5328521495-001 sshd[18297]: Failed password for invalid user dax from 133.130.119.178 port 12993 ssh2 2020-07-21T17:13:25.9740401495-001 sshd[18463]: Invalid user developer from 133.130.119.178 port 11526 2020-07-21T17:13:25.9777431495-001 sshd[18463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-119-178.a04a.g.tyo1.static.cnode.io 2020-07-21T17:13:25.9740401495-001 sshd[18463]: Invalid user developer from 133.130.119.178 port 11526 2020-07-21T17:13:27.4991691495-001 sshd[18463]: Failed password for invalid user developer from 133.130.119.178 port 11526 ssh2 ... |
2020-07-22 06:19:26 |
| 196.43.231.123 | attackbots | 2020-07-21T21:28:01.682220abusebot-4.cloudsearch.cf sshd[1111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.231.123 2020-07-21T21:28:01.675792abusebot-4.cloudsearch.cf sshd[1111]: Invalid user mailtest from 196.43.231.123 port 56880 2020-07-21T21:28:03.464066abusebot-4.cloudsearch.cf sshd[1111]: Failed password for invalid user mailtest from 196.43.231.123 port 56880 ssh2 2020-07-21T21:30:54.139760abusebot-4.cloudsearch.cf sshd[1171]: Invalid user quange from 196.43.231.123 port 48978 2020-07-21T21:30:54.150178abusebot-4.cloudsearch.cf sshd[1171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.231.123 2020-07-21T21:30:54.139760abusebot-4.cloudsearch.cf sshd[1171]: Invalid user quange from 196.43.231.123 port 48978 2020-07-21T21:30:57.015903abusebot-4.cloudsearch.cf sshd[1171]: Failed password for invalid user quange from 196.43.231.123 port 48978 ssh2 2020-07-21T21:33:39.370739abusebot-4. ... |
2020-07-22 06:30:21 |
| 68.183.133.156 | attack | failed WP brute force attempts, also using: 139.59.147.218 , 5.196.74.5 , 91.134.248.249 |
2020-07-22 06:10:19 |
| 62.92.48.242 | attackspambots | Jul 22 00:39:03 ift sshd\[19751\]: Invalid user fabiana from 62.92.48.242Jul 22 00:39:05 ift sshd\[19751\]: Failed password for invalid user fabiana from 62.92.48.242 port 64774 ssh2Jul 22 00:43:36 ift sshd\[20476\]: Invalid user wangjw from 62.92.48.242Jul 22 00:43:38 ift sshd\[20476\]: Failed password for invalid user wangjw from 62.92.48.242 port 7505 ssh2Jul 22 00:48:26 ift sshd\[21061\]: Invalid user af from 62.92.48.242 ... |
2020-07-22 05:52:16 |
| 159.65.84.164 | attackspambots | Jul 21 21:30:09 game-panel sshd[28280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164 Jul 21 21:30:12 game-panel sshd[28280]: Failed password for invalid user zhan from 159.65.84.164 port 52572 ssh2 Jul 21 21:34:05 game-panel sshd[28447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164 |
2020-07-22 06:05:23 |
| 40.75.87.73 | attackbotsspam | 40.75.87.73 - - \[21/Jul/2020:23:48:48 +0200\] "POST //wp-login.php HTTP/1.0" 200 6848 "https://die-netzialisten.de//wp-login.php" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/78.0.3904.108 Safari/537.36" 40.75.87.73 - - \[21/Jul/2020:23:48:49 +0200\] "POST //wp-login.php HTTP/1.0" 200 6848 "https://die-netzialisten.de//wp-login.php" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/78.0.3904.108 Safari/537.36" 40.75.87.73 - - \[21/Jul/2020:23:48:49 +0200\] "POST //wp-login.php HTTP/1.0" 200 6848 "https://die-netzialisten.de//wp-login.php" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/78.0.3904.108 Safari/537.36" |
2020-07-22 06:24:33 |
| 218.92.0.148 | attackspam | Honeypot hit. |
2020-07-22 06:09:22 |
| 186.225.80.194 | attackspambots | Jul 21 23:43:18 ns382633 sshd\[27272\]: Invalid user sshuser from 186.225.80.194 port 37932 Jul 21 23:43:18 ns382633 sshd\[27272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.225.80.194 Jul 21 23:43:20 ns382633 sshd\[27272\]: Failed password for invalid user sshuser from 186.225.80.194 port 37932 ssh2 Jul 22 00:02:20 ns382633 sshd\[30919\]: Invalid user wusifan from 186.225.80.194 port 52489 Jul 22 00:02:20 ns382633 sshd\[30919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.225.80.194 |
2020-07-22 06:03:17 |
| 89.133.103.216 | attackspambots | Invalid user cjohnson from 89.133.103.216 port 44840 |
2020-07-22 06:05:52 |
| 178.32.104.221 | attack | Tried to hack WP Site |
2020-07-22 05:53:40 |