City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.57.93.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.57.93.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121001 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 08:53:51 CST 2024
;; MSG SIZE rcvd: 106
Host 104.93.57.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.93.57.140.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
71.177.42.130 | attack | Shenzhen TV vulnerability scan, accessed by IP not domain: 71.177.42.130 - - [18/Nov/2019:07:47:43 +0000] "POST /editBlackAndWhiteList HTTP/1.1" 404 260 "-" "ApiTool" |
2019-11-19 08:22:37 |
14.102.119.67 | attackspambots | 9000/tcp [2019-11-18]1pkt |
2019-11-19 08:36:48 |
14.187.84.106 | attack | port 23 attempt blocked |
2019-11-19 08:35:23 |
83.233.60.202 | attackspam | port scan and connect, tcp 23 (telnet) |
2019-11-19 08:20:28 |
139.59.226.82 | attack | F2B jail: sshd. Time: 2019-11-19 01:23:06, Reported by: VKReport |
2019-11-19 08:35:09 |
84.201.30.89 | attackbotsspam | Invalid user portal from 84.201.30.89 port 48980 |
2019-11-19 08:37:35 |
36.233.44.199 | attackspambots | port 23 attempt blocked |
2019-11-19 08:11:07 |
128.201.76.22 | attackbots | Scanning unused Default website or suspicious access to valid sites from IP marked as abusive |
2019-11-19 08:25:21 |
14.29.162.139 | attackspam | 2019-11-18T16:36:40.5434291495-001 sshd\[37016\]: Failed password for invalid user diuble from 14.29.162.139 port 53593 ssh2 2019-11-18T17:37:52.7193411495-001 sshd\[39143\]: Invalid user book from 14.29.162.139 port 17685 2019-11-18T17:37:52.7275181495-001 sshd\[39143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 2019-11-18T17:37:55.5883731495-001 sshd\[39143\]: Failed password for invalid user book from 14.29.162.139 port 17685 ssh2 2019-11-18T17:42:08.9934001495-001 sshd\[39297\]: Invalid user iloveyou from 14.29.162.139 port 52973 2019-11-18T17:42:08.9994931495-001 sshd\[39297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 ... |
2019-11-19 08:20:04 |
185.129.148.175 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-11-19 08:12:03 |
122.14.209.213 | attack | Nov 18 23:21:06 : SSH login attempts with invalid user |
2019-11-19 08:21:03 |
125.227.13.141 | attackspambots | SSH Bruteforce |
2019-11-19 08:14:46 |
27.70.153.187 | attackbotsspam | Nov 19 01:33:33 * sshd[3362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.70.153.187 Nov 19 01:33:36 * sshd[3362]: Failed password for invalid user test from 27.70.153.187 port 36694 ssh2 |
2019-11-19 08:34:29 |
112.114.105.144 | attackspam | Code execution attempt: GET /type.php?template=tag_(){};@unlink(FILE);print_r(xbshell);assert($_POST[1]);{//../rss |
2019-11-19 08:15:11 |
113.138.178.119 | attackspambots | Unauthorised access (Nov 19) SRC=113.138.178.119 LEN=40 TTL=49 ID=18545 TCP DPT=8080 WINDOW=3143 SYN |
2019-11-19 08:21:18 |