City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.73.139.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;152.73.139.12. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 15:21:16 CST 2025
;; MSG SIZE rcvd: 106
Host 12.139.73.152.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.139.73.152.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
132.232.93.195 | attackspam | Oct 7 22:43:30 meumeu sshd[28889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.93.195 Oct 7 22:43:32 meumeu sshd[28889]: Failed password for invalid user Terminer from 132.232.93.195 port 56222 ssh2 Oct 7 22:48:11 meumeu sshd[29705]: Failed password for root from 132.232.93.195 port 39218 ssh2 ... |
2019-10-08 04:57:42 |
81.22.45.106 | attackbots | 10/07/2019-15:52:15.244618 81.22.45.106 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 83 |
2019-10-08 05:08:31 |
182.148.114.139 | attack | Oct 7 22:52:42 MK-Soft-VM3 sshd[22037]: Failed password for root from 182.148.114.139 port 55340 ssh2 ... |
2019-10-08 04:59:25 |
51.255.174.164 | attack | 2019-10-07T20:25:29.146998abusebot.cloudsearch.cf sshd\[9216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-51-255-174.eu user=root |
2019-10-08 04:43:36 |
203.125.145.58 | attackbotsspam | Oct 5 06:31:27 xb3 sshd[20926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.125.145.58 user=r.r Oct 5 06:31:29 xb3 sshd[20926]: Failed password for r.r from 203.125.145.58 port 45898 ssh2 Oct 5 06:31:29 xb3 sshd[20926]: Received disconnect from 203.125.145.58: 11: Bye Bye [preauth] Oct 5 06:36:06 xb3 sshd[21157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.125.145.58 user=r.r Oct 5 06:36:08 xb3 sshd[21157]: Failed password for r.r from 203.125.145.58 port 58332 ssh2 Oct 5 06:36:08 xb3 sshd[21157]: Received disconnect from 203.125.145.58: 11: Bye Bye [preauth] Oct 5 06:40:48 xb3 sshd[21413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.125.145.58 user=r.r Oct 5 06:40:50 xb3 sshd[21413]: Failed password for r.r from 203.125.145.58 port 42540 ssh2 Oct 5 06:40:50 xb3 sshd[21413]: Received disconnect from 203.125.145.58: 1........ ------------------------------- |
2019-10-08 05:10:30 |
185.176.27.42 | attack | 10/07/2019-22:15:28.977342 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-08 05:05:51 |
220.94.205.226 | attackbotsspam | Oct 7 22:42:00 vpn01 sshd[20473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.94.205.226 Oct 7 22:42:03 vpn01 sshd[20473]: Failed password for invalid user helpdesk from 220.94.205.226 port 54836 ssh2 ... |
2019-10-08 04:58:42 |
5.199.139.201 | attackspam | Oct 7 22:30:34 ns37 sshd[27019]: Failed password for root from 5.199.139.201 port 50878 ssh2 Oct 7 22:30:34 ns37 sshd[27019]: Failed password for root from 5.199.139.201 port 50878 ssh2 |
2019-10-08 04:46:31 |
113.182.62.220 | attackbotsspam | Oct 7 21:43:54 cws2.mueller-hostname.net sshd[58583]: Address 113.182.62.220 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 7 21:43:54 cws2.mueller-hostname.net sshd[58583]: Failed password for invalid user admin from 113.182.62.220 port 47166 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.182.62.220 |
2019-10-08 05:07:33 |
180.160.5.138 | attack | Chat Spam |
2019-10-08 04:44:51 |
94.191.47.31 | attackbots | Oct 7 10:21:04 auw2 sshd\[9792\]: Invalid user Collection2017 from 94.191.47.31 Oct 7 10:21:04 auw2 sshd\[9792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.31 Oct 7 10:21:06 auw2 sshd\[9792\]: Failed password for invalid user Collection2017 from 94.191.47.31 port 42784 ssh2 Oct 7 10:25:13 auw2 sshd\[10166\]: Invalid user Lion!23 from 94.191.47.31 Oct 7 10:25:13 auw2 sshd\[10166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.31 |
2019-10-08 04:40:49 |
222.186.52.89 | attack | Oct 7 23:04:46 legacy sshd[10020]: Failed password for root from 222.186.52.89 port 39074 ssh2 Oct 7 23:04:48 legacy sshd[10020]: Failed password for root from 222.186.52.89 port 39074 ssh2 Oct 7 23:04:50 legacy sshd[10020]: Failed password for root from 222.186.52.89 port 39074 ssh2 ... |
2019-10-08 05:13:59 |
62.75.150.162 | attackbots | Oct 7 01:18:42 kmh-wsh-001-nbg03 sshd[7355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.150.162 user=r.r Oct 7 01:18:44 kmh-wsh-001-nbg03 sshd[7355]: Failed password for r.r from 62.75.150.162 port 37482 ssh2 Oct 7 01:18:44 kmh-wsh-001-nbg03 sshd[7355]: Received disconnect from 62.75.150.162 port 37482:11: Bye Bye [preauth] Oct 7 01:18:44 kmh-wsh-001-nbg03 sshd[7355]: Disconnected from 62.75.150.162 port 37482 [preauth] Oct 7 01:25:36 kmh-wsh-001-nbg03 sshd[7634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.150.162 user=r.r Oct 7 01:25:38 kmh-wsh-001-nbg03 sshd[7634]: Failed password for r.r from 62.75.150.162 port 47640 ssh2 Oct 7 01:25:38 kmh-wsh-001-nbg03 sshd[7634]: Received disconnect from 62.75.150.162 port 47640:11: Bye Bye [preauth] Oct 7 01:25:38 kmh-wsh-001-nbg03 sshd[7634]: Disconnected from 62.75.150.162 port 47640 [preauth] Oct 7 01:29:10 kmh-wsh-........ ------------------------------- |
2019-10-08 04:50:01 |
222.186.180.9 | attack | Oct 7 22:45:31 km20725 sshd\[2344\]: Failed password for root from 222.186.180.9 port 62680 ssh2Oct 7 22:45:33 km20725 sshd\[2346\]: Failed password for root from 222.186.180.9 port 26036 ssh2Oct 7 22:45:35 km20725 sshd\[2348\]: Failed password for root from 222.186.180.9 port 11128 ssh2Oct 7 22:45:35 km20725 sshd\[2350\]: Failed password for root from 222.186.180.9 port 19002 ssh2 ... |
2019-10-08 04:46:47 |
128.199.79.37 | attackspam | web-1 [ssh_2] SSH Attack |
2019-10-08 04:41:33 |