City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.149.161.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;165.149.161.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 14:17:17 CST 2025
;; MSG SIZE rcvd: 108
b'Host 138.161.149.165.in-addr.arpa not found: 2(SERVFAIL)
'
b'
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.102.50.137 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 24122 proto: TCP cat: Misc Attack |
2020-04-25 22:37:46 |
| 185.153.198.240 | attack | 33952/tcp 34095/tcp 33942/tcp... [2020-03-28/04-25]1253pkt,527pt.(tcp) |
2020-04-25 22:28:15 |
| 80.82.70.239 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 6162 proto: TCP cat: Misc Attack |
2020-04-25 22:48:56 |
| 103.64.148.113 | attack | xmlrpc attack |
2020-04-25 22:14:06 |
| 184.105.247.240 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-04-25 22:29:34 |
| 80.82.77.234 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 55315 proto: TCP cat: Misc Attack |
2020-04-25 22:47:16 |
| 185.175.93.18 | attackbotsspam | scans 7 times in preceeding hours on the ports (in chronological order) 13400 35900 1400 38400 13900 64500 47700 resulting in total of 51 scans from 185.175.93.0/24 block. |
2020-04-25 22:25:46 |
| 185.156.73.60 | attack | scans 27 times in preceeding hours on the ports (in chronological order) 23389 3390 6689 33891 43389 33789 3381 33079 32389 3384 4489 5589 33789 3030 43389 13389 3390 3394 9090 9989 3395 33891 33892 3399 3392 8899 3398 resulting in total of 31 scans from 185.156.72.0/22 block. |
2020-04-25 22:27:21 |
| 185.156.73.49 | attack | Triggered: repeated knocking on closed ports. |
2020-04-25 22:27:50 |
| 184.105.247.247 | attack | scans once in preceeding hours on the ports (in chronological order) 4786 resulting in total of 8 scans from 184.105.0.0/16 block. |
2020-04-25 22:29:02 |
| 207.154.193.178 | attackbotsspam | Apr 25 15:43:32 home sshd[26064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 Apr 25 15:43:33 home sshd[26064]: Failed password for invalid user alison from 207.154.193.178 port 40090 ssh2 Apr 25 15:46:57 home sshd[26735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 ... |
2020-04-25 22:12:02 |
| 73.15.91.251 | attackspambots | Apr 25 12:17:27 *** sshd[26678]: Invalid user pakhi from 73.15.91.251 |
2020-04-25 22:15:01 |
| 80.82.77.189 | attackspam | Apr 25 16:44:24 debian-2gb-nbg1-2 kernel: \[10084803.824981\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.189 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=35566 PROTO=TCP SPT=47007 DPT=29088 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-25 22:48:20 |
| 94.102.50.150 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 9003 resulting in total of 47 scans from 94.102.48.0/20 block. |
2020-04-25 22:36:48 |
| 94.102.52.57 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 312 proto: TCP cat: Misc Attack |
2020-04-25 22:35:48 |