City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.61.231.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.61.231.139. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:55:04 CST 2025
;; MSG SIZE rcvd: 107
Host 139.231.61.160.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.231.61.160.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 187.141.250.114 | attack | Brute forcing RDP port 3389 |
2020-08-11 03:08:22 |
| 137.74.233.91 | attack | Aug 10 20:37:27 marvibiene sshd[17656]: Failed password for root from 137.74.233.91 port 48082 ssh2 |
2020-08-11 03:19:00 |
| 198.199.73.239 | attackbotsspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-11 03:14:40 |
| 20.49.2.187 | attackspam | Aug 10 19:28:21 ajax sshd[13151]: Failed password for root from 20.49.2.187 port 34716 ssh2 |
2020-08-11 03:13:01 |
| 51.255.197.164 | attack | 2020-08-10T13:13:19.991002morrigan.ad5gb.com sshd[634630]: Failed password for root from 51.255.197.164 port 50402 ssh2 2020-08-10T13:13:22.235921morrigan.ad5gb.com sshd[634630]: Disconnected from authenticating user root 51.255.197.164 port 50402 [preauth] |
2020-08-11 02:59:55 |
| 50.7.178.54 | attackbots |
|
2020-08-11 03:15:06 |
| 106.51.133.194 | attackbots | Unauthorized connection attempt from IP address 106.51.133.194 on Port 445(SMB) |
2020-08-11 03:08:08 |
| 84.17.47.66 | attackbotsspam | (From no-replyredge@google.com) Gооd dаy! If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. With our service you get Domain Authority above 50 points in just 30 days. This service is guaranteed For more information, check our service here https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ thank you Mike Monkey Digital support@monkeydigital.co |
2020-08-11 03:11:12 |
| 88.230.46.243 | attackspam | Unauthorized connection attempt from IP address 88.230.46.243 on Port 445(SMB) |
2020-08-11 03:28:24 |
| 125.161.139.28 | attack | Unauthorized connection attempt from IP address 125.161.139.28 on Port 445(SMB) |
2020-08-11 02:58:14 |
| 107.175.64.15 | attackspam |
|
2020-08-11 03:26:05 |
| 151.80.173.36 | attackbots | Aug 10 13:30:17 localhost sshd[118656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36 user=root Aug 10 13:30:19 localhost sshd[118656]: Failed password for root from 151.80.173.36 port 50323 ssh2 Aug 10 13:34:25 localhost sshd[119089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36 user=root Aug 10 13:34:27 localhost sshd[119089]: Failed password for root from 151.80.173.36 port 54777 ssh2 Aug 10 13:38:30 localhost sshd[119542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36 user=root Aug 10 13:38:33 localhost sshd[119542]: Failed password for root from 151.80.173.36 port 59230 ssh2 ... |
2020-08-11 03:03:22 |
| 122.170.1.254 | attackbotsspam | Unauthorized connection attempt from IP address 122.170.1.254 on Port 445(SMB) |
2020-08-11 03:13:17 |
| 112.85.42.181 | attackspam | Aug 10 20:55:34 abendstille sshd\[23643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root Aug 10 20:55:36 abendstille sshd\[23643\]: Failed password for root from 112.85.42.181 port 7615 ssh2 Aug 10 20:55:39 abendstille sshd\[23643\]: Failed password for root from 112.85.42.181 port 7615 ssh2 Aug 10 20:55:43 abendstille sshd\[23643\]: Failed password for root from 112.85.42.181 port 7615 ssh2 Aug 10 20:55:46 abendstille sshd\[23643\]: Failed password for root from 112.85.42.181 port 7615 ssh2 ... |
2020-08-11 02:59:29 |
| 122.118.3.119 | attack | Unauthorized connection attempt from IP address 122.118.3.119 on Port 445(SMB) |
2020-08-11 03:31:50 |