City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.3.71.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50890
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;156.3.71.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 11:37:30 CST 2025
;; MSG SIZE rcvd: 104
31.71.3.156.in-addr.arpa domain name pointer user71x31.lcusd.k12.ca.us.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.71.3.156.in-addr.arpa name = user71x31.lcusd.k12.ca.us.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 111.72.193.188 | attackspambots | Sep 11 20:24:54 srv01 postfix/smtpd\[22026\]: warning: unknown\[111.72.193.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 20:28:20 srv01 postfix/smtpd\[22103\]: warning: unknown\[111.72.193.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 20:28:31 srv01 postfix/smtpd\[22103\]: warning: unknown\[111.72.193.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 20:28:47 srv01 postfix/smtpd\[22103\]: warning: unknown\[111.72.193.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 20:29:06 srv01 postfix/smtpd\[22103\]: warning: unknown\[111.72.193.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-12 19:02:45 |
| 161.35.11.118 | attack | TCP port : 23546 |
2020-09-12 19:12:36 |
| 5.253.25.170 | attackbotsspam | SSH Brute-Forcing (server2) |
2020-09-12 19:17:15 |
| 112.85.42.89 | attack | Sep 12 16:01:48 dhoomketu sshd[3032851]: Failed password for root from 112.85.42.89 port 10976 ssh2 Sep 12 16:01:50 dhoomketu sshd[3032851]: Failed password for root from 112.85.42.89 port 10976 ssh2 Sep 12 16:01:53 dhoomketu sshd[3032851]: Failed password for root from 112.85.42.89 port 10976 ssh2 Sep 12 16:05:24 dhoomketu sshd[3032891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root Sep 12 16:05:26 dhoomketu sshd[3032891]: Failed password for root from 112.85.42.89 port 59831 ssh2 ... |
2020-09-12 18:57:27 |
| 222.186.175.169 | attackspam | Sep 12 10:46:29 scw-6657dc sshd[6206]: Failed password for root from 222.186.175.169 port 5366 ssh2 Sep 12 10:46:29 scw-6657dc sshd[6206]: Failed password for root from 222.186.175.169 port 5366 ssh2 Sep 12 10:46:32 scw-6657dc sshd[6206]: Failed password for root from 222.186.175.169 port 5366 ssh2 ... |
2020-09-12 18:52:29 |
| 104.245.44.233 | attackbotsspam | SSH Brute Force |
2020-09-12 19:01:58 |
| 185.232.30.130 | attackbots | SmallBizIT.US 8 packets to tcp(3386,3387,8899,9999,33390,35589,50000,63389) |
2020-09-12 19:19:58 |
| 125.141.139.29 | attack | 2020-09-12T10:06:54.694366ionos.janbro.de sshd[82217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.29 user=root 2020-09-12T10:06:56.888282ionos.janbro.de sshd[82217]: Failed password for root from 125.141.139.29 port 43360 ssh2 2020-09-12T10:09:32.600535ionos.janbro.de sshd[82245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.29 user=root 2020-09-12T10:09:34.483495ionos.janbro.de sshd[82245]: Failed password for root from 125.141.139.29 port 46372 ssh2 2020-09-12T10:12:12.122563ionos.janbro.de sshd[82258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.29 user=root 2020-09-12T10:12:13.970426ionos.janbro.de sshd[82258]: Failed password for root from 125.141.139.29 port 49388 ssh2 2020-09-12T10:14:38.177068ionos.janbro.de sshd[82263]: Invalid user test from 125.141.139.29 port 52408 2020-09-12T10:14:38.186130ionos.janbro.de ... |
2020-09-12 19:21:11 |
| 167.172.38.238 | attackspam | TCP ports : 7419 / 12063 |
2020-09-12 19:22:57 |
| 179.210.168.98 | attackspam | Automatic report - Banned IP Access |
2020-09-12 18:51:38 |
| 115.99.115.49 | attackspam | port scan and connect, tcp 80 (http) |
2020-09-12 19:08:43 |
| 203.163.250.57 | attack | Bruteforce detected by fail2ban |
2020-09-12 19:13:28 |
| 103.149.34.22 | attackspambots | Icarus honeypot on github |
2020-09-12 19:03:36 |
| 60.182.119.183 | attack | Sep 11 19:43:29 srv01 postfix/smtpd\[951\]: warning: unknown\[60.182.119.183\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 19:46:56 srv01 postfix/smtpd\[7706\]: warning: unknown\[60.182.119.183\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 19:50:24 srv01 postfix/smtpd\[2040\]: warning: unknown\[60.182.119.183\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 20:00:47 srv01 postfix/smtpd\[13769\]: warning: unknown\[60.182.119.183\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 11 20:00:59 srv01 postfix/smtpd\[13769\]: warning: unknown\[60.182.119.183\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-12 19:08:12 |
| 82.223.104.73 | attackspam | 82.223.104.73 - - [12/Sep/2020:04:55:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1874 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 82.223.104.73 - - [12/Sep/2020:04:55:44 +0100] "POST /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 82.223.104.73 - - [12/Sep/2020:04:55:45 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-12 19:07:22 |