City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.139.241.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;147.139.241.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 19:20:30 CST 2025
;; MSG SIZE rcvd: 107
Host 12.241.139.147.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.241.139.147.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.154.184.196 | attackspambots | Invalid user fsb from 195.154.184.196 port 43568 |
2020-05-23 13:46:45 |
| 49.234.30.19 | attackspam | Invalid user bfz from 49.234.30.19 port 47904 |
2020-05-23 13:29:51 |
| 128.199.69.169 | attackbotsspam | Invalid user ulm from 128.199.69.169 port 56634 |
2020-05-23 14:10:00 |
| 64.225.58.121 | attackspam | Invalid user mwy from 64.225.58.121 port 57400 |
2020-05-23 13:25:20 |
| 182.61.2.238 | attackbots | Invalid user yoh from 182.61.2.238 port 56664 |
2020-05-23 13:55:41 |
| 77.139.162.127 | attackspambots | Invalid user xbp from 77.139.162.127 port 15660 |
2020-05-23 13:24:42 |
| 52.66.104.148 | attack | May 22 23:03:17 server1 sshd\[6017\]: Invalid user dsj from 52.66.104.148 May 22 23:03:17 server1 sshd\[6017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.104.148 May 22 23:03:19 server1 sshd\[6017\]: Failed password for invalid user dsj from 52.66.104.148 port 47698 ssh2 May 22 23:05:32 server1 sshd\[6654\]: Invalid user pmc from 52.66.104.148 May 22 23:05:32 server1 sshd\[6654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.66.104.148 ... |
2020-05-23 13:27:27 |
| 129.204.240.42 | attackbots | May 23 07:07:23 mail sshd[25145]: Invalid user cvz from 129.204.240.42 May 23 07:07:23 mail sshd[25145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.240.42 May 23 07:07:23 mail sshd[25145]: Invalid user cvz from 129.204.240.42 May 23 07:07:25 mail sshd[25145]: Failed password for invalid user cvz from 129.204.240.42 port 40294 ssh2 ... |
2020-05-23 14:08:57 |
| 206.189.118.7 | attackspam | Invalid user ymw from 206.189.118.7 port 52400 |
2020-05-23 13:42:25 |
| 159.65.183.47 | attack | Invalid user gnr from 159.65.183.47 port 55850 |
2020-05-23 14:02:48 |
| 80.211.45.85 | attack | Invalid user rtp from 80.211.45.85 port 54090 |
2020-05-23 13:22:54 |
| 223.18.255.171 | attack | Invalid user admin from 223.18.255.171 port 56409 |
2020-05-23 13:40:16 |
| 175.24.18.86 | attackbotsspam | Invalid user xfe from 175.24.18.86 port 36086 |
2020-05-23 13:59:03 |
| 27.34.251.60 | attackspam | $f2bV_matches |
2020-05-23 13:38:05 |
| 62.210.125.29 | attack | 2020-05-22T23:37:49.725077server.mjenks.net sshd[1114567]: Invalid user cq from 62.210.125.29 port 34542 2020-05-22T23:37:49.727514server.mjenks.net sshd[1114567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.125.29 2020-05-22T23:37:49.725077server.mjenks.net sshd[1114567]: Invalid user cq from 62.210.125.29 port 34542 2020-05-22T23:37:52.507560server.mjenks.net sshd[1114567]: Failed password for invalid user cq from 62.210.125.29 port 34542 ssh2 2020-05-22T23:41:00.671922server.mjenks.net sshd[1114978]: Invalid user ding from 62.210.125.29 port 40224 ... |
2020-05-23 13:25:48 |