City: Weatherford
Region: Texas
Country: United States
Internet Service Provider: Nextlink
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.147.118.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.147.118.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031102 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 08:23:26 CST 2025
;; MSG SIZE rcvd: 108
130.118.147.142.in-addr.arpa domain name pointer 142-147-118-130.ptr.nxlink.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.118.147.142.in-addr.arpa name = 142-147-118-130.ptr.nxlink.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
93.119.178.174 | attack | Dec 5 08:19:07 firewall sshd[25407]: Invalid user flanigan from 93.119.178.174 Dec 5 08:19:08 firewall sshd[25407]: Failed password for invalid user flanigan from 93.119.178.174 port 38012 ssh2 Dec 5 08:25:03 firewall sshd[25577]: Invalid user danut from 93.119.178.174 ... |
2019-12-05 19:57:25 |
103.104.49.134 | attack | TCP Port Scanning |
2019-12-05 20:00:38 |
206.189.93.108 | attackspambots | Dec 5 03:44:12 plusreed sshd[19611]: Invalid user host from 206.189.93.108 ... |
2019-12-05 20:04:20 |
80.151.236.165 | attack | Dec 5 01:37:28 php1 sshd\[22071\]: Invalid user gdm from 80.151.236.165 Dec 5 01:37:28 php1 sshd\[22071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=p5097eca5.dip0.t-ipconnect.de Dec 5 01:37:31 php1 sshd\[22071\]: Failed password for invalid user gdm from 80.151.236.165 port 37350 ssh2 Dec 5 01:44:49 php1 sshd\[23072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=p5097eca5.dip0.t-ipconnect.de user=root Dec 5 01:44:51 php1 sshd\[23072\]: Failed password for root from 80.151.236.165 port 46835 ssh2 |
2019-12-05 19:55:02 |
37.228.117.143 | attackbots | Invalid user nfs from 37.228.117.143 port 59768 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.117.143 Failed password for invalid user nfs from 37.228.117.143 port 59768 ssh2 Invalid user asik from 37.228.117.143 port 37382 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.117.143 |
2019-12-05 19:32:51 |
212.129.140.89 | attackbotsspam | Dec 5 02:15:12 TORMINT sshd\[28087\]: Invalid user cbrown from 212.129.140.89 Dec 5 02:15:12 TORMINT sshd\[28087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.140.89 Dec 5 02:15:15 TORMINT sshd\[28087\]: Failed password for invalid user cbrown from 212.129.140.89 port 47912 ssh2 ... |
2019-12-05 19:50:40 |
167.71.214.37 | attackspambots | SSH bruteforce (Triggered fail2ban) |
2019-12-05 19:52:09 |
115.165.166.193 | attack | Dec 5 07:52:21 hell sshd[16525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.165.166.193 Dec 5 07:52:22 hell sshd[16525]: Failed password for invalid user ts from 115.165.166.193 port 36206 ssh2 ... |
2019-12-05 19:53:48 |
103.125.191.45 | attack | They tried to acces my yahoo mail address ! |
2019-12-05 19:53:09 |
49.88.112.75 | attackspam | Dec 5 16:30:37 gw1 sshd[11052]: Failed password for root from 49.88.112.75 port 45723 ssh2 ... |
2019-12-05 19:35:50 |
217.112.142.60 | attack | Dec 5 07:26:50 server postfix/smtpd[14278]: NOQUEUE: reject: RCPT from sown.wokoro.com[217.112.142.60]: 554 5.7.1 Service unavailable; Client host [217.112.142.60] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2019-12-05 19:45:16 |
140.143.142.190 | attackspam | Dec 5 13:54:56 vtv3 sshd[9828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.142.190 Dec 5 13:54:58 vtv3 sshd[9828]: Failed password for invalid user nagasawa from 140.143.142.190 port 33136 ssh2 Dec 5 14:01:01 vtv3 sshd[12986]: Failed password for root from 140.143.142.190 port 35402 ssh2 Dec 5 14:12:58 vtv3 sshd[18990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.142.190 Dec 5 14:13:00 vtv3 sshd[18990]: Failed password for invalid user zeus from 140.143.142.190 port 39948 ssh2 Dec 5 14:19:11 vtv3 sshd[21843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.142.190 Dec 5 14:43:35 vtv3 sshd[1478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.142.190 Dec 5 14:43:37 vtv3 sshd[1478]: Failed password for invalid user 18607 from 140.143.142.190 port 51326 ssh2 Dec 5 14:49:48 vtv3 sshd[4282]: pam_unix(ss |
2019-12-05 19:52:24 |
51.68.190.223 | attack | $f2bV_matches |
2019-12-05 19:41:54 |
165.227.187.185 | attackspambots | Dec 5 12:09:52 vmanager6029 sshd\[14969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.187.185 user=backup Dec 5 12:09:55 vmanager6029 sshd\[14969\]: Failed password for backup from 165.227.187.185 port 39548 ssh2 Dec 5 12:18:26 vmanager6029 sshd\[15180\]: Invalid user mckinsey from 165.227.187.185 port 40692 Dec 5 12:18:26 vmanager6029 sshd\[15180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.187.185 |
2019-12-05 19:34:00 |
203.195.229.145 | attackbotsspam | [ThuDec0507:26:46.8278912019][:error][pid429:tid47011388753664][client203.195.229.145:4587][client203.195.229.145]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\\(chr\?\\\\\\\\\(\?[0-9]{1\,3}\?\\\\\\\\\)\|\?=\?f\(\?:open\|write\)\?\\\\\\\\\(\|\\\\\\\\b\(\?:passthru\|serialize\|php_uname\|phpinfo\|shell_exec\|preg_\\\\\\\\w \|mysql_query\|exec\|eval\|base64_decode\|decode_base64\|rot13\|base64_url_decode\|gz\(\?:inflate\|decode\|uncompress\)\|strrev\|zlib_\\\\\\\\w \)\\\\\\\\b\?\(\?..."atARGS:widgetConfig[code].[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"767"][id"340095"][rev"53"][msg"Atomicorp.comWAFRules:AttackBlocked-PHPfunctioninArgument-thismaybeanattack."][data"die\(@md5\,ARGS:widgetConfig[code]"][severity"CRITICAL"][hostname"148.251.104.86"][uri"/index.php"][unique_id"XeijJr6bEKgXVLV3gBnAEAAAAgw"][ThuDec0507:26:47.5166132019][:error][pid429:tid47011388753664][client203.195.229.145:4587][client203.195.229.145]ModSecurity:Accessdeni |
2019-12-05 19:43:29 |