City: Tempe
Region: Arizona
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.169.85.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.169.85.39. IN A
;; AUTHORITY SECTION:
. 372 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019111601 1800 900 604800 86400
;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 17 04:53:31 CST 2019
;; MSG SIZE rcvd: 117
39.85.169.149.in-addr.arpa domain name pointer 149-169-85-39.nat.asu.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.85.169.149.in-addr.arpa name = 149-169-85-39.nat.asu.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.196.65.217 | attackspam | Masscan Port Scanning Tool Detection |
2019-12-17 00:00:50 |
| 50.67.178.164 | attackspambots | Dec 16 05:47:58 hanapaa sshd\[31568\]: Invalid user redweb from 50.67.178.164 Dec 16 05:47:58 hanapaa sshd\[31568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106ac202e1dbfb3.va.shawcable.net Dec 16 05:48:00 hanapaa sshd\[31568\]: Failed password for invalid user redweb from 50.67.178.164 port 41772 ssh2 Dec 16 05:56:56 hanapaa sshd\[32418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106ac202e1dbfb3.va.shawcable.net user=root Dec 16 05:56:57 hanapaa sshd\[32418\]: Failed password for root from 50.67.178.164 port 49250 ssh2 |
2019-12-16 23:58:38 |
| 89.222.181.58 | attack | Dec 16 16:30:37 sd-53420 sshd\[25560\]: Invalid user notused from 89.222.181.58 Dec 16 16:30:37 sd-53420 sshd\[25560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58 Dec 16 16:30:39 sd-53420 sshd\[25560\]: Failed password for invalid user notused from 89.222.181.58 port 41600 ssh2 Dec 16 16:38:07 sd-53420 sshd\[28406\]: Invalid user webadmin from 89.222.181.58 Dec 16 16:38:07 sd-53420 sshd\[28406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58 ... |
2019-12-16 23:43:28 |
| 182.156.234.90 | attack | Unauthorized connection attempt from IP address 182.156.234.90 on Port 445(SMB) |
2019-12-16 23:29:24 |
| 218.92.0.173 | attack | Dec 16 15:37:31 zeus sshd[16906]: Failed password for root from 218.92.0.173 port 17411 ssh2 Dec 16 15:37:35 zeus sshd[16906]: Failed password for root from 218.92.0.173 port 17411 ssh2 Dec 16 15:37:41 zeus sshd[16906]: Failed password for root from 218.92.0.173 port 17411 ssh2 Dec 16 15:37:45 zeus sshd[16906]: Failed password for root from 218.92.0.173 port 17411 ssh2 Dec 16 15:37:50 zeus sshd[16906]: Failed password for root from 218.92.0.173 port 17411 ssh2 |
2019-12-16 23:41:29 |
| 123.21.110.127 | attack | Brute force attempt |
2019-12-17 00:08:13 |
| 185.184.79.30 | attack | firewall-block, port(s): 3389/tcp |
2019-12-16 23:33:37 |
| 46.101.73.64 | attackspam | Dec 16 16:45:15 vps691689 sshd[30675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64 Dec 16 16:45:17 vps691689 sshd[30675]: Failed password for invalid user emmalyn from 46.101.73.64 port 49644 ssh2 Dec 16 16:50:40 vps691689 sshd[30813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64 ... |
2019-12-17 00:06:00 |
| 118.70.13.250 | attackspam | Unauthorized connection attempt from IP address 118.70.13.250 on Port 445(SMB) |
2019-12-17 00:01:40 |
| 103.254.198.67 | attack | Dec 16 16:52:25 jane sshd[3041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.198.67 Dec 16 16:52:27 jane sshd[3041]: Failed password for invalid user nichael from 103.254.198.67 port 51575 ssh2 ... |
2019-12-16 23:57:35 |
| 106.13.51.110 | attackspam | $f2bV_matches |
2019-12-16 23:51:45 |
| 51.91.212.81 | attackbotsspam | 12/16/2019-09:56:02.159826 51.91.212.81 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52 |
2019-12-16 23:30:19 |
| 45.134.179.241 | attackspam | TCP 3389 (RDP) |
2019-12-16 23:31:52 |
| 146.0.209.72 | attackspam | Dec 16 10:22:42 linuxvps sshd\[51222\]: Invalid user sugawara from 146.0.209.72 Dec 16 10:22:42 linuxvps sshd\[51222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.209.72 Dec 16 10:22:44 linuxvps sshd\[51222\]: Failed password for invalid user sugawara from 146.0.209.72 port 57540 ssh2 Dec 16 10:30:01 linuxvps sshd\[55890\]: Invalid user m1ch@3l from 146.0.209.72 Dec 16 10:30:01 linuxvps sshd\[55890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.209.72 |
2019-12-16 23:48:29 |
| 45.141.85.100 | attackbots | TCP 3389 (RDP) |
2019-12-16 23:31:33 |