City: unknown
Region: unknown
Country: Mexico
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.16.39.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;159.16.39.192. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 19:13:24 CST 2025
;; MSG SIZE rcvd: 106
Host 192.39.16.159.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 192.39.16.159.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.133.103.216 | attackspam | Tried sshing with brute force. |
2020-04-02 20:58:06 |
| 52.117.168.217 | attackbotsspam | SSH brute-force attempt |
2020-04-02 20:56:11 |
| 112.67.184.144 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-02 20:31:33 |
| 23.41.114.28 | attackbots | Attempted connection to port 18671. |
2020-04-02 21:07:08 |
| 111.93.10.210 | attackbotsspam | frenzy |
2020-04-02 20:57:51 |
| 128.199.162.108 | attackspam | Brute-force attempt banned |
2020-04-02 20:37:51 |
| 109.151.52.7 | attackspam | $f2bV_matches |
2020-04-02 20:23:23 |
| 87.0.64.190 | attack | Unauthorized connection attempt detected from IP address 87.0.64.190 to port 80 |
2020-04-02 20:34:47 |
| 3.14.161.177 | attackbotsspam | Attempted connection to port 9224. |
2020-04-02 20:59:39 |
| 139.59.84.29 | attack | Mar 31 04:31:20 cumulus sshd[29787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29 user=r.r Mar 31 04:31:23 cumulus sshd[29787]: Failed password for r.r from 139.59.84.29 port 49410 ssh2 Mar 31 04:31:23 cumulus sshd[29787]: Received disconnect from 139.59.84.29 port 49410:11: Bye Bye [preauth] Mar 31 04:31:23 cumulus sshd[29787]: Disconnected from 139.59.84.29 port 49410 [preauth] Mar 31 04:44:30 cumulus sshd[30753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29 user=r.r Mar 31 04:44:33 cumulus sshd[30753]: Failed password for r.r from 139.59.84.29 port 55432 ssh2 Mar 31 04:44:33 cumulus sshd[30753]: Received disconnect from 139.59.84.29 port 55432:11: Bye Bye [preauth] Mar 31 04:44:33 cumulus sshd[30753]: Disconnected from 139.59.84.29 port 55432 [preauth] Mar 31 04:49:16 cumulus sshd[31032]: Invalid user user from 139.59.84.29 port 50670 Mar 31 04:49:16 cumu........ ------------------------------- |
2020-04-02 20:55:35 |
| 23.54.149.240 | attack | Attempted connection to port 21426. |
2020-04-02 21:06:36 |
| 42.56.70.168 | attackspam | Apr 2 14:44:34 nextcloud sshd\[6356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.56.70.168 user=root Apr 2 14:44:36 nextcloud sshd\[6356\]: Failed password for root from 42.56.70.168 port 57791 ssh2 Apr 2 14:47:33 nextcloud sshd\[10526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.56.70.168 user=root |
2020-04-02 20:52:41 |
| 178.69.40.160 | attackspambots | <a href=https://cleaningservices.kiev.ua/>клининговые агенства</a> Буду очень рада если информация окажется полезной -- Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36 OPR/54.0.2952.64 (Edition Yx) |
2020-04-02 20:50:53 |
| 167.71.67.238 | attackspambots | Apr 2 14:34:45 tuxlinux sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.67.238 user=root Apr 2 14:34:48 tuxlinux sshd[10469]: Failed password for root from 167.71.67.238 port 45550 ssh2 Apr 2 14:34:45 tuxlinux sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.67.238 user=root Apr 2 14:34:48 tuxlinux sshd[10469]: Failed password for root from 167.71.67.238 port 45550 ssh2 Apr 2 14:47:32 tuxlinux sshd[10722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.67.238 user=root ... |
2020-04-02 20:55:09 |
| 171.224.178.133 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 04:50:14. |
2020-04-02 20:36:24 |