City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.253.138.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.253.138.124. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 12:37:13 CST 2025
;; MSG SIZE rcvd: 108
124.138.253.144.in-addr.arpa domain name pointer syn-144-253-138-124.biz.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.138.253.144.in-addr.arpa name = syn-144-253-138-124.biz.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.2.5.24 | attack | WordPress login Brute force / Web App Attack on client site. |
2019-09-06 08:20:19 |
| 49.231.222.5 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-05 20:43:23,806 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.5) |
2019-09-06 08:10:34 |
| 51.75.58.97 | attackbots | 2019-09-05T21:03:37.153613mail01 postfix/smtpd[10235]: warning: ip97.ip-51-75-58.eu[51.75.58.97]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-09-05T21:03:43.309382mail01 postfix/smtpd[10232]: warning: ip97.ip-51-75-58.eu[51.75.58.97]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-09-05T21:03:53.471993mail01 postfix/smtpd[6349]: warning: ip97.ip-51-75-58.eu[51.75.58.97]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-09-06 08:45:42 |
| 212.92.144.10 | attackspam | Unauthorized connection attempt from IP address 212.92.144.10 on Port 445(SMB) |
2019-09-06 08:26:53 |
| 203.151.83.160 | attack | fail2ban honeypot |
2019-09-06 08:29:57 |
| 118.217.216.100 | attackspam | Sep 5 20:32:32 TORMINT sshd\[7555\]: Invalid user pass from 118.217.216.100 Sep 5 20:32:32 TORMINT sshd\[7555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.217.216.100 Sep 5 20:32:34 TORMINT sshd\[7555\]: Failed password for invalid user pass from 118.217.216.100 port 56064 ssh2 ... |
2019-09-06 08:37:03 |
| 128.199.186.65 | attackspambots | Sep 5 13:30:15 hpm sshd\[22885\]: Invalid user 123456 from 128.199.186.65 Sep 5 13:30:15 hpm sshd\[22885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.186.65 Sep 5 13:30:17 hpm sshd\[22885\]: Failed password for invalid user 123456 from 128.199.186.65 port 59270 ssh2 Sep 5 13:35:37 hpm sshd\[23358\]: Invalid user odoo from 128.199.186.65 Sep 5 13:35:37 hpm sshd\[23358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.186.65 |
2019-09-06 08:13:55 |
| 36.156.24.43 | attack | Sep 5 14:26:42 web9 sshd\[20114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.43 user=root Sep 5 14:26:44 web9 sshd\[20114\]: Failed password for root from 36.156.24.43 port 38092 ssh2 Sep 5 14:26:50 web9 sshd\[20140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.43 user=root Sep 5 14:26:52 web9 sshd\[20140\]: Failed password for root from 36.156.24.43 port 36462 ssh2 Sep 5 14:26:55 web9 sshd\[20140\]: Failed password for root from 36.156.24.43 port 36462 ssh2 |
2019-09-06 08:31:38 |
| 112.237.37.119 | attack | DVR web service hack: "GET ../../mnt/custom/ProductDefinition" |
2019-09-06 08:05:17 |
| 93.200.66.32 | attack | Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb. |
2019-09-06 08:05:50 |
| 93.180.14.13 | attackspam | fail2ban |
2019-09-06 08:23:17 |
| 196.218.156.140 | attackbots | Unauthorized connection attempt from IP address 196.218.156.140 on Port 445(SMB) |
2019-09-06 08:19:58 |
| 61.42.20.36 | attack | Unauthorized connection attempt from IP address 61.42.20.36 on Port 445(SMB) |
2019-09-06 08:46:59 |
| 14.29.174.142 | attackspambots | Sep 6 01:46:17 mail sshd\[10338\]: Failed password for invalid user 123456 from 14.29.174.142 port 59482 ssh2 Sep 6 01:49:10 mail sshd\[10734\]: Invalid user timemachine from 14.29.174.142 port 58510 Sep 6 01:49:10 mail sshd\[10734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.174.142 Sep 6 01:49:11 mail sshd\[10734\]: Failed password for invalid user timemachine from 14.29.174.142 port 58510 ssh2 Sep 6 01:51:55 mail sshd\[10967\]: Invalid user web from 14.29.174.142 port 57542 Sep 6 01:51:55 mail sshd\[10967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.174.142 |
2019-09-06 08:09:39 |
| 165.227.165.98 | attackbots | Sep 6 01:57:12 localhost sshd\[28307\]: Invalid user minecraft from 165.227.165.98 port 50702 Sep 6 01:57:12 localhost sshd\[28307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.165.98 Sep 6 01:57:14 localhost sshd\[28307\]: Failed password for invalid user minecraft from 165.227.165.98 port 50702 ssh2 |
2019-09-06 08:08:12 |