City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.130.33.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.130.33.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:00:08 CST 2025
;; MSG SIZE rcvd: 106
Host 39.33.130.142.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 39.33.130.142.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.125.66.28 | attackbots | Rude login attack (5 tries in 1d) |
2020-02-05 07:29:02 |
| 61.177.172.128 | attackspambots | ... |
2020-02-05 07:28:40 |
| 188.165.219.27 | attackspambots | Rude login attack (9 tries in 1d) |
2020-02-05 07:13:26 |
| 112.85.42.186 | attackbots | Feb 5 04:30:48 areeb-Workstation sshd[16338]: Failed password for root from 112.85.42.186 port 16044 ssh2 Feb 5 04:30:53 areeb-Workstation sshd[16338]: Failed password for root from 112.85.42.186 port 16044 ssh2 ... |
2020-02-05 07:27:06 |
| 162.247.74.27 | attackbotsspam | $f2bV_matches |
2020-02-05 07:36:15 |
| 218.255.139.205 | attack | firewall-block, port(s): 445/tcp |
2020-02-05 07:27:36 |
| 110.25.88.116 | attackbotsspam | Unauthorized connection attempt detected from IP address 110.25.88.116 to port 5555 [J] |
2020-02-05 07:04:07 |
| 192.228.100.98 | attack | $f2bV_matches |
2020-02-05 07:20:52 |
| 218.92.0.178 | attackspam | Feb 4 23:53:41 * sshd[23512]: Failed password for root from 218.92.0.178 port 2516 ssh2 Feb 4 23:53:54 * sshd[23512]: error: maximum authentication attempts exceeded for root from 218.92.0.178 port 2516 ssh2 [preauth] |
2020-02-05 07:05:35 |
| 187.185.70.10 | attackspambots | Feb 4 21:14:54 markkoudstaal sshd[21566]: Failed password for root from 187.185.70.10 port 37790 ssh2 Feb 4 21:18:11 markkoudstaal sshd[22162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.185.70.10 Feb 4 21:18:13 markkoudstaal sshd[22162]: Failed password for invalid user wwwdxlm from 187.185.70.10 port 38924 ssh2 |
2020-02-05 07:17:37 |
| 138.122.146.162 | attackspam | Unauthorized connection attempt detected from IP address 138.122.146.162 to port 2220 [J] |
2020-02-05 07:15:21 |
| 42.2.13.100 | attackbotsspam | Unauthorized connection attempt detected from IP address 42.2.13.100 to port 5555 [J] |
2020-02-05 07:33:34 |
| 112.85.42.182 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182 user=root Failed password for root from 112.85.42.182 port 53513 ssh2 Failed password for root from 112.85.42.182 port 53513 ssh2 Failed password for root from 112.85.42.182 port 53513 ssh2 Failed password for root from 112.85.42.182 port 53513 ssh2 |
2020-02-05 07:12:12 |
| 52.34.83.11 | attack | 02/05/2020-00:26:34.147712 52.34.83.11 Protocol: 6 SURICATA TLS invalid record/traffic |
2020-02-05 07:35:25 |
| 103.127.66.170 | attack | Unauthorized connection attempt detected from IP address 103.127.66.170 to port 445 |
2020-02-05 07:25:47 |