City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.211.9.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.211.9.38. IN A
;; AUTHORITY SECTION:
. 494 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:13:47 CST 2022
;; MSG SIZE rcvd: 105
38.9.211.140.in-addr.arpa domain name pointer webdav1.osuosl.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.9.211.140.in-addr.arpa name = webdav1.osuosl.org.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.76.34.87 | attackbotsspam | k+ssh-bruteforce |
2019-11-04 21:06:36 |
175.211.112.66 | attackbots | $f2bV_matches_ltvn |
2019-11-04 21:27:02 |
36.92.7.35 | attack | HTTP/80/443 Probe, BF, WP, Hack - |
2019-11-04 20:49:09 |
103.242.0.249 | attackspambots | Nov 4 07:15:31 myhostname sshd[18875]: Invalid user ftp from 103.242.0.249 Nov 4 07:15:31 myhostname sshd[18875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.0.249 Nov 4 07:15:33 myhostname sshd[18875]: Failed password for invalid user ftp from 103.242.0.249 port 57448 ssh2 Nov 4 07:15:33 myhostname sshd[18875]: Received disconnect from 103.242.0.249 port 57448:11: Bye Bye [preauth] Nov 4 07:15:33 myhostname sshd[18875]: Disconnected from 103.242.0.249 port 57448 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.242.0.249 |
2019-11-04 21:25:04 |
138.68.148.177 | attack | 2019-11-04T11:59:32.292766abusebot-5.cloudsearch.cf sshd\[14699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177 user=root |
2019-11-04 21:04:14 |
177.139.177.94 | attackspambots | Nov 4 13:24:33 vmanager6029 sshd\[19053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.177.94 user=root Nov 4 13:24:36 vmanager6029 sshd\[19053\]: Failed password for root from 177.139.177.94 port 35161 ssh2 Nov 4 13:29:19 vmanager6029 sshd\[19094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.177.94 user=root |
2019-11-04 20:47:35 |
180.230.181.14 | attackbots | Nov 4 13:49:12 srv01 sshd[28052]: Invalid user temp from 180.230.181.14 Nov 4 13:49:12 srv01 sshd[28052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.230.181.14 Nov 4 13:49:12 srv01 sshd[28052]: Invalid user temp from 180.230.181.14 Nov 4 13:49:14 srv01 sshd[28052]: Failed password for invalid user temp from 180.230.181.14 port 36084 ssh2 Nov 4 13:53:44 srv01 sshd[28217]: Invalid user virginia from 180.230.181.14 ... |
2019-11-04 20:56:06 |
80.82.64.176 | attackbotsspam | attack against WP site |
2019-11-04 21:27:42 |
193.112.14.81 | attack | Nov 4 10:07:19 ncomp sshd[11700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.14.81 user=root Nov 4 10:07:20 ncomp sshd[11700]: Failed password for root from 193.112.14.81 port 34886 ssh2 Nov 4 10:25:19 ncomp sshd[11931]: Invalid user test1 from 193.112.14.81 |
2019-11-04 21:11:08 |
144.76.238.209 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-04 21:21:31 |
46.38.144.202 | attackspam | 2019-11-04T13:54:28.130933mail01 postfix/smtpd[6021]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-04T13:54:51.061582mail01 postfix/smtpd[6021]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-04T13:55:15.138037mail01 postfix/smtpd[6021]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-04 21:12:44 |
106.87.96.126 | attackbots | FTP Brute Force |
2019-11-04 21:19:28 |
193.32.160.151 | attackspam | 2019-11-04T14:02:43.946799mail01 postfix/smtpd[21003]: NOQUEUE: reject: RCPT from unknown[193.32.160.151]: 550 |
2019-11-04 21:03:45 |
132.145.201.163 | attackbots | Nov 4 15:19:29 gw1 sshd[25766]: Failed password for root from 132.145.201.163 port 21329 ssh2 ... |
2019-11-04 21:17:50 |
190.115.1.49 | attackbots | Nov 4 03:21:29 ws22vmsma01 sshd[146611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.1.49 Nov 4 03:21:30 ws22vmsma01 sshd[146611]: Failed password for invalid user semira from 190.115.1.49 port 48688 ssh2 ... |
2019-11-04 21:13:42 |