City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.199.145.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.199.145.139. IN A
;; AUTHORITY SECTION:
. 300 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023042100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 21 15:08:04 CST 2023
;; MSG SIZE rcvd: 108
Host 139.145.199.161.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.145.199.161.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
95.14.95.230 | attack | Automatic report - Port Scan Attack |
2020-03-24 07:17:21 |
170.130.187.22 | attack | Honeypot hit. |
2020-03-24 07:12:28 |
192.144.164.134 | attackbotsspam | Invalid user sunsf from 192.144.164.134 port 18754 |
2020-03-24 07:04:32 |
165.227.69.39 | attackbotsspam | Automatic report BANNED IP |
2020-03-24 06:47:13 |
54.233.206.174 | attack | /wp-admin/includes/fdsj399jdsf.php |
2020-03-24 07:17:53 |
193.112.219.207 | attackspam | SSH brute-force attempt |
2020-03-24 06:43:42 |
45.143.220.251 | attack | firewall-block, port(s): 5062/udp |
2020-03-24 06:47:30 |
184.105.139.110 | attackbots | Port 5786 scan denied |
2020-03-24 07:08:50 |
198.108.67.107 | attackbots | firewall-block, port(s): 8833/tcp |
2020-03-24 07:05:43 |
80.15.151.134 | attackbots | Automatic report - Port Scan Attack |
2020-03-24 07:01:22 |
167.71.4.157 | attack | Brute force VPN server |
2020-03-24 06:59:28 |
159.65.35.14 | attack | [PY] (sshd) Failed SSH login from 159.65.35.14 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 17:12:40 svr sshd[4076177]: Invalid user kcronin from 159.65.35.14 port 56576 Mar 23 17:12:42 svr sshd[4076177]: Failed password for invalid user kcronin from 159.65.35.14 port 56576 ssh2 Mar 23 17:22:23 svr sshd[4117204]: Invalid user openvpn_as from 159.65.35.14 port 44468 Mar 23 17:22:25 svr sshd[4117204]: Failed password for invalid user openvpn_as from 159.65.35.14 port 44468 ssh2 Mar 23 17:30:23 svr sshd[4151117]: Invalid user poke from 159.65.35.14 port 59370 |
2020-03-24 07:09:55 |
91.121.86.62 | attackspam | Mar 23 23:22:22 vps691689 sshd[11031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.86.62 Mar 23 23:22:24 vps691689 sshd[11031]: Failed password for invalid user vic from 91.121.86.62 port 33762 ssh2 Mar 23 23:25:39 vps691689 sshd[11067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.86.62 ... |
2020-03-24 06:49:17 |
134.209.228.253 | attackbotsspam | Mar 23 23:30:18 ns3042688 sshd\[17964\]: Invalid user liufenglin from 134.209.228.253 Mar 23 23:30:18 ns3042688 sshd\[17964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253 Mar 23 23:30:19 ns3042688 sshd\[17964\]: Failed password for invalid user liufenglin from 134.209.228.253 port 46520 ssh2 Mar 23 23:37:30 ns3042688 sshd\[19387\]: Invalid user mu from 134.209.228.253 Mar 23 23:37:30 ns3042688 sshd\[19387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.228.253 ... |
2020-03-24 06:53:20 |
180.158.187.154 | attackspambots | firewall-block, port(s): 1433/tcp |
2020-03-24 07:14:06 |